[1] 徐明迪,张焕国,张帆,等.可信系统信任链研究综述[J].电子学报,2014,42(10):2024-2031. (XU M D, ZHANG H G, ZHANG F, et al. Survey on chain of trust of trusted system[J]. Acta Electronica Sinica, 2014, 42(10):2024-2031.) [2] 马卓.无线网络可信接入理论及其应用研究[D].西安:西安电子科技大学,2010:23-44. (MA Z. Trusted access in wireless network theory and applications[D]. Xi'an:Xidian University, 2010:23-44) [3] 徐明迪,张焕国,赵恒,等.可信计算平台信任链安全性分析[J].计算机学报,2010,33(7):1165-1176. (XU M D, ZHANG H G, ZHAO H, et al. Security analysis on trust chain of trusted computing platform[J]. Chinese Journal of Computers, 2010, 33(7):1165-1176.) [4] ZHANG H, YAN F, FU J, et al. Research on theory and key technology of trusted computing platform security testing and evaluation[J]. Science China:Information Sciences, 2010, 53(3):434-453. [5] XU W, ZHANG X, HU H, et al. Remote attestation with domain-based integrity model and policy analysis[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(3):429-442. [6] ARAPINIS M, RITTER E, RYAN M D. StatVerif:verification of stateful processes[C]//CSF 2011:Proceedings of the 24th IEEE Computer Security Foundations Symposium. Washington, DC:IEEE Computer Society, 2011:33-47. [7] DATTA A, FRANKLIN J, GARG D, et al. A logic of secure systems and its application to trusted computing[C]//SP 2009:Proceedings of the 30th IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2009:221-236. [8] 徐明迪,张焕国,张帆,等.授权约束下的平台配置证明研究[J].电子学报,2017,45(6):1389-1395. (XU M D, ZHANG H G, ZHANG F, et al. Authorization restriction-based platform configuration attestation[J]. Acta Electronica Sinica, 2017, 45(6):1389-1395.) [9] JAIN L, VYAS J. Security analysis of remote attestation, CS259 Project Report[R]. Palo Alto:Stanford University, 2008:1-8. [10] BLANCHET B, ABADI M, FOURNET C. Automated verification of selected equivalences for security protocols[J]. The Journal of Logic and Algebraic Programming, 2008, 75(1):3-51. [11] SAILER R, ZHANG X L, JAEGER T, et al. Design and implementation of a TCG-based integrity measurement architecture[C]//SSYM 2004:Proceedings of the 13th Conference on USENIX Security Symposium. Berkeley, CA:USENIX Association, 2004, 13:223-238. |