[1] SMITH J, NAIR R. Virtual Machines: Versatile Platforms for Systems and Processes [M]. Singapore: Elsevier, 2009: 5-8. [2] 丁滟, 王怀民, 史佩昌, 等.可信云服务[J]. 计算机学报, 2015, 38(1):133-149.(DING Y, WANG H M, SHI P C, et al. Trusted cloud service [J]. Chinese Journal of Computers, 2015, 38(1): 133-149.) [3] 俞能海, 郝卓, 徐甲甲, 等.云安全研究进展综述[J]. 电子学报, 2013, 41(2):371-381.(YU N H, HAO Z, XU J J, et al. Review of cloud computing security[J]. Acta Electronica Sinica, 2013, 41(2): 371-381.) [4] 闫世杰, 陈永刚, 刘鹏, 等.云计算中虚拟机计算环境安全防护方案[J]. 通信学报, 2015, 36(11):102-107.(YAN S J, CHEN Y G, LIU P, et al. Security protection mechanism of virtual machine computing environment under the cloud computing [J]. Journal on Communications, 2015, 36(11):102-107.) [5] SANTOS N, GUMMADI K, RODRIGUES R. Towards trusted cloud computing[C]//Proceedings of the 2009 USENIX Association Workshop on Hot Topics in Cloud Computing. Berkeley: USENIX, 2009: 14-19. [6] 郭琰.基干VMI的虚拟机安全监控技术研究 [D] 西安:西安工业大学, 2014:20-29.(GUO Y. Virtual machine security monitoring technology based on VMI [D] Xi'an: Xi'an Technological University, 2014:20-29.) [7] 周振吉, 吴礼发, 洪征, 等.云计算环境下的虚拟机可信度量模型[J]. 东南大学学报(自然科学), 2014, 44(1):45-50.(ZHOU Z J, WU L L F, HONG Z, et al. Trustworthiness measurement model of virtual machine for cloud computing[J]. Journal of Southeast University (Natural Science Edition), 2014, 44(1): 45-50.) [8] ZHANG L, CHEN X S, LIU L, et al. Trusted domain hierarchical model based on noninterference theory [J]. Journal of China Universities of Posts and Telecommunications, 2015, 22(4): 7-16. [9] GRAEME P, CHEN L Q, DALTON C. Trusted Computing Platforms[M]. Berlin: Springer, 2014: 1-25. [10] GOGUEN J A, MESEGUER J. Security policies and security models[C]//Proceedings of the IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1982: 11-20. [11] 林杰, 刘川意, 方滨兴.IVirt基于虚拟机自省的运行环境完整性度量机制[J]. 计算机学报, 2015, 38(1):191-203.(LIN J, LIU C Y, FANG B X. IVirt runtime environment integrity measurement mechanism based on virtual machine introspection[J]. Chinese Journal of Computers, 2015, 38(1): 191-203.) [12] ZHANG F, CHEN J, CHEN H, et al. CloudVisor: retrofitting protection of virtual machines in muti-tenant cloud with nest virtualization[C]//Proceedings of the 23rd ACM Symposium on Operating System Principles. New York: ACM, 2011: 203-216. [13] 冯帆.基于VMM的Rootkit检测及防护模型研究[D]. 北京:北京理工大学, 2014:40-48.(FENG F. The research on VMM-based Rootkit detection and protection model[D]. Beijing: Beijing Institute of Technology, 2014:40-48.) |