[1] 林闯,苏文博,孟坤,等.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784. (LIN C, SU W B, MENG K, et al. Cloud computing security:architecture, mechanism and modeling[J]. Chinese Journal of Computers, 2013, 36(9):1765-1784.) [2] 俞能海,郝卓,徐甲甲,等.云安全研究进展综述[J]. 电子学报,2013,41(2):371-381. (YU N H, HAO Z, XU J J, et al. Review of cloud computing security[J]. Acta Electronica Sinica, 2013, 41(2):371-381.) [3] ALI M, KHAN S U, VASILAKOS A V. Security in cloud computing:opportunities and challenges[J]. Information Science, 2015, 305:357-383.) [4] XU P, CHEN H, ZOU D, et al. Fine-grained and heterogeneous proxy re-encryption for secure cloud storage[J]. Chinese Science Bulletin, 2014, 59(32):4201-4209. [5] XIANG S, ZHAO B, YANG A, et al. Dynamic measurement protocol in infrastructure as a service[J]. Tsinghua Science and Technology, 2014, 19(5):470-477. [6] YU F, ZHANG H, ZHAO B, et al. A formal analysis of trusted platform module 2.0 hash-based message authentication code authorization under digital rights management scenario[J]. Security and Communication Networks, 2015, 9(15):2802-2815. [7] 谭良,徐志伟.基于可信计算平台的信任链传递研究进展[J].计算机科学,2008,35(10):15-18. (TAN L, XU Z W. Development of the transitive trusted chain based on TPM[J]. Computer Science, 2008, 35(10):15-18.) [8] 徐明迪,张焕国,张帆,等.可信系统信任链研究综述[J].电子学报,2014,42(10):2024-2031. (XU M D, ZHANG H G, ZHANG F, et al. Survey on chain of trust of trusted system[J]. Acta Electronica Sinica, 2014, 42(10):2024-2031.) [9] 谭良,陈菊,周明天.可信终端动态运行环境的可信证据收集机制[J]. 电子学报,2013,41(1):77-85. (TAN L, CHEN J, ZHOU M T. Trustworthiness evidence collection mechanism of running dynamic environment of trusted terminal[J]. Acta Electronica Sinica, 2013, 41(1):77-85.) [10] 于爱民,冯登国,汪丹.基于属性的远程证明模型[J].通信学报,2010,31(8):1-8. (YU A M, FENG D G, WANG D. Property-based remote attestation model[J]. Journal on Communications, 2010, 31(8):1-8.) [11] 谭良,陈菊.一种可信终端运行环境远程证明方案[J].软件学报,2014,25(6):1273-1290. (TAN L, CHEN J. Remote attestation project of the running environment of the trusted terminal[J]. Journal of Software, 2014, 25(6):1273-1290.) [12] BERGER S, CÁCERES R, GOLDMAN K A, et al. VTPM:virtualizing the trusted platform module[C]//USENIX-SS'06:Proceedings of the 15th USENIX Security Symposium. Berkeley, CA:USENIX Association, 2006, 15:305-320. [13] DALTON C I, PLAQUIN D, WEIDNER W, et al. Trusted virtual platforms:a key enabler for converged client devices[J]. ACM SIGOPS Operating Systems Review, 2009, 43(1):36-43. [14] BERGER S, CÁCERES R, PENDARAKIS D, et al. TVDc:managing security in the trusted virtual datacenter[J]. ACM SIGOPS Operating Systems Review, 2008, 42(1):40-47. [15] KRAUTHEIM F J, PHATAK D S, SHERMAN A T. Introducing the trusted virtual environment module:a new mechanism for rooting trust in cloud computing[C]//TRUST'10:Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, LNCS 6101. Berlin:Springer, 2010:211-227. [16] 王丽娜,高汉军,余荣威,等.基于信任扩展的可信虚拟执行环境构建方法研究[J].通信学报,2011,32(9):1-8. (WANG L N, GAO H J, YU R W, et al. Research of constructing trusted virtual execution environment based on trust extension[J]. Journal on Communications, 2011, 32(9):1-8.) [17] GARFINKEL T, PFAFF B, CHOW J, et al. Terra:a virtual machine-based platform for trusted computing[C]//SOSP'03:Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. New York:ACM, 2003:193-206. [18] PFITZMANN B, RIORDAN J, STVBLE C, et al. The PERSEUS system architecture, IBM Research Report RZ 3335(#93381)[R]. Zurich:IBM Research, 2001. [19] 常德显,冯登国,秦宇,等.基于扩展LS2的可信虚拟平台信任链分析[J].通信学报,2013,34(5):31-41. (CHANG D X, FENG D G, QIN Y, et al. Analyzing the trust chain of trusted virtualization platform based on the extended LS2[J]. Journal on Communications, 2013, 34(5):31-41.) [20] ZHANG L, CHEN X, LIU L, et al. Trusted domain hierarchical model based on noninterference theory[J]. The Journal of China Universities of Posts and Telecommunications, 2015, 22(4):7-16. [21] YU Z, ZHANG W, DAI H, et al. A trusted architecture for virtual machines on cloud servers with trusted platform module and certificate authority[J]. Journal of Signal Processing Systems, 2017, 86(2/3):327-336. [22] 池亚平,李欣,王艳,等.基于KVM的可信虚拟化平台设计与实现[J]. 计算机工程与设计,2016,37(6):1451-1455. (CHI Y P, LI X, WANG Y, et al. KVM-based trusted virtualization platform design and implementation[J]. Computer Engineering and Design, 2016, 37(6):1451-1455.) [23] 李海威,范博,李文锋.一种可信虚拟平台构建方法的研究和改进[J].信息网络安全,2015(1):1-5. (LI H W, FAN B, LI W F. Research and improvement on constructing method of a trusted virtualization platform[J]. Netinfo Security, 2015(1):1-5.) [24] 徐天琦,刘淑芬,韩璐.基于KVM的可信虚拟化架构模型[J]. 吉林大学学报(理学版),2014,52(3):531-534. (XU T Q, LIU S F, HAN L. KVM-based trusted virtualization architecture model[J]. Journal of Jilin University (Science Edition), 2014, 52(3):531-534.) [25] 杨丽芳,刘琳.基于虚拟机的可信计算安全平台架构设计[J].煤炭技术,2014,33(2):170-172. (YANG L F, LIU L. Design of trusted computing security platform architecture based on virtual machine[J]. Coal Technology, 2014, 33(2):170-172.) [26] 蔡谊,左晓栋.面向虚拟化技术的可信计算平台研究[J].信息安全与通信保密,2013(6):77-79. (CAI Y, ZUO X D. Trusted computing platform for virtualization technology[J]. Information Security and Communications Privacy, 2013(6):77-79.) [27] SCARLATA V, ROZAS C, WISEMAN M, et al. TPM virtualization:building a general framework[M]//Trusted Computing.[S.l.]:Vieweg+Teubner, 2007, 2007:43-56. [28] KRAUTHEIM F J, PHATAK D S, SHERMAN A T. Introducing the trusted virtual environment module:a new mechanism for rooting trust in cloud computing[C]//TRUST 2010:Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, LNCS 6101. Berlin:Springer, 2010:211-227. [29] SHEN C, ZHANG H, WANG H, et al. Research on trusted computing and its development[J]. Science China Information Sciences, 2010, 53(3):405-433. [30] 朱智强.混合云服务安全若干理论与关键技术研究[D].武汉:武汉大学,2011:91-117. (ZHU Z Q. The research on some theories and key technologes of hybrid cloud computing security[D]. Wuhan:Wuhan University, 2011:91-117.) [31] 曲文涛.虚拟机系统的可信检测与度量[D].上海:上海交通大学,2010. (QU W T. Trusted detect and measure for virtual machine system[D]. Shanghai:Shanghai Jiao Tong University, 2010.) [32] BARTHE G, BETARTE G, CAMPO J D, et al. Formally verifying isolation and availability in an idealized model of virtualization[C]//FM 2011:Proceedings of the 17th International Symposium on Formal Methods, LNCS 6664. Berlin:Springer, 2011:231-245. [33] DATTA A, FRANKLIN J, GARG D, et al. A logic of secure systems and its application to trusted computing[C]//SP'09:Proceedings of the 200930th IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2009:221-236. [34] CHEN G, JIN H, ZOU D, et al. SafeStack:automatically patching stack-based buffer overflow vulnerabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2013, 10(6):368-379. [35] VERMEULEN S. SELinux Cookbook[M]//Birmingham, UK:Packet Publishing, 2014:2-9. [36] VARMA P D K, RADHA V. Prevention of buffer overflow attacks using advanced stackguard[C]//Proceedings of 2010 International Conference on Advances in Communication, Network, and Computing. Washington, DC:IEEE Computer Society, 2010:357-359. [37] WANG Z, JIANG X. HyperSafe:a lightweight approach to provide lifetime hypervisor control-flow integrity[C]//SP'10:Proceedings of the 2010 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2010:380-395. [38] McCUNE J M, LI Y, QU N, et al. TrustVisor:efficient TCB reduction and attestation[C]//SP'10:Proceedings of the 2010 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2010:143-158. [39] TAKEMURA C, CRAWFORD L S. The Book of Xen:A Practical Guide for the System Administrator[M]. San Francisco, CA:No Starch Press, 2009:2-15. [40] Xen Project. The Xen Project, the powerful open source industry standard for virtualization[EB/OL].[2017-03-22]. http://www.xenproject.org. [41] Mozilla Firefox Ltd. The new, fast browser for Mac, PC and Linux|Firefox[EB/OL].[2017-04-12]. https://www.mozilla.org/en-US/firefox/#. [42] Kingsoft Office Software. Best office run on Linux platform, WPS Office for Linux[EB/OL].[2017-05-05]. https://www.wps.com/linux?from=download_page. [43] CodeWeavers Inc. WineHQ-Run Windows applications on Linux, BSD, Solaris and macOS[EB/OL].[2017-04-12]. https://www.winehq.org/. [44] The Eclipse Foundation. Eclipse[EB/OL].[2017-04-02]. https://www.eclipse.org/downloads/. |