[1]WU H, TAN C, WANG H. Study on the realization of differentiated services in network isolation system[J]. Journal of Computer Applications, 2008,28(3):620-628.(武海燕,谭成翔,汪海航.区分服务在网络隔离系统中的研究与实现[J].计算机应用,2008,28(3):620-628.)
[2]LI F,SU L,SHI G, et al. Research status and development trends of access control model[J].Acta Electronica Sinica, 2012,40(4):806-813. (李凤华,苏链,史国振,等.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):806-813.)
[3]ZHOU Y. Research on network isolation and secure data exchange prototype[D].Shanghai: Tongji University,2006.(周永明.网络隔离与安全交互原型研究[D].上海:同济大学,2006.)
[4]TIAN X, QIU Z, SUN C, et al. Network isolation and switching based on hardware region division and IP packet reintegration[J].Journal of Computer Science, 2008,35(2):81-95.(田新广,邱志明,孙春来,等.基于硬件分区和IP报文还原的网络隔离与信息交换[J].计算机科学,2008,35(2):81-95.)
[5]TANG J. One-way network isolation system's design and realization[D]. Chengdu: University of Electronic Science and Technology of China,2012.(唐晋.网络单向隔离控制系统的设计与实现[D].成都:电子科技大学,2012.)
[6]JIANG X, JIANG Z. Design of enhanced memory protection trusted computing architecture[J]. Computer and Engineering and Design,2013,34(9):3108-3113.(姜徐,蒋志祥.增强存储保护的可信计算架构设计[J].计算机工程与设计,2013,34(9):3108-3113.)
[7]SHI G, ZHANG J. Research and development of trustworthiness attestation in trusted computing[J]. Application Research of Computers,2011,28(12):4414-4419. (施光源,张建标.可信计算领域中可信证明的研究与进展[J].计算机应用研究,2011,28(12):4414-4419.)
[8]DONG W, CHEN L Q. Recent advances on trusted computing in China[J].Chinese Science Bulletin, 2012, 57(35):4529-4532.
[9]SHI R, FAN X. Session key agreement scheme for Ad Hoc network based on identity authentication[J]. Journal of Central South University,2010,41(6):2236-2239. (施荣华,樊翔宇. 基于身份认证的Ad Hoc密钥协商方案[J].中南大学学报,2010,41(6):2236-2239.)
[10]LI Y, SU W, WANG Y. New ID-based identification scheme[J].Journal of Harbin Engineering University, 2009, 30(1):54-60.(李艳平,苏万力,王育民.新的基于ID的身份鉴别方案[J].哈尔滨工程大学学报, 2009, 30(1):54-60.)
[11]FIAT A, SHAMIR A. How to prove yourself: practial solution to identification and signature problems[C]// Proceedings on Advances in Cryptology-CRYPTO 1986. London: Springer-Verlag, 1986:186-194.
[12]WANG M. Research on identity-based digital signature and signcryption schemes[D]. Xi'an: Xidian University, 2006:1-20.(王萌.基于身份的数字签名及签密技术研究[D].西安:西安电子科技大学,2006:1-20.)
[13]HESS F. Efficient identity based signature schemes based on pairings[C]// Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography. London:Springer-Verlag, 2002:310-324.
[14]WANG J, LIANG L,YU W. Design of trusted authentication-enabled mobile IPSec VPN system[J]. Computer and Engineering and Design, 2013,34(7):2343-2352. (王剑,梁灵飞,俞卫华.支持可信认证的IPSec VPN系统设计[J].计算机工程与设计,2013,34(7):2343-2352.)
[15]DENG Y, CHEN Z. Policy embedded dynamic integrity active measurement architecture[J]. Application Research of Computers, 2013,30(1):162-264. (邓锐,陈左宁.基于策略嵌入和可信计算的完整性主动动态度量架构[J]. 计算机应用研究,2013,30(1):162-264.)
[16]FUKUYAMA F. Trust: The social virtues and the creation of prosperity[M].London: Hamish Hamilton,1995.
[17]LIU Y, ZHEGN X,CHEN D. Trust predicting using roles-based reputation in trust network[J]. Journal of Beijing University of Posts and Telecommunications,2013,36(1):72-76.(刘迎春,郑小林,陈德人.信任网络中基于角色信誉的信任预测[J]. 北京邮电大学学报,2013,36(1):72-76.)
[18]DAI H. The research on trust evaluation mechanism based on trusted computing technology[D].Nanjing: Nanjing University of Posts and Telecommunications, 2011:1-87. (戴桦. 基于可信计算技术的信任评估机制研究[D].南京:南京邮电大学,2011:1-87.) |