参考文献/References:
[1] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1):71-83.
Feng Dengguo, Zhang Min, Zhang Yan, et al. Study on cloud computing security [J]. Journal of Software, 2011, 22(1): 71-83.(in Chinese)
[2] Santos N, Gummadi K, Rodrigues R. Towards trusted cloud computing[C]//Proceedings of 2009 USENIX Association Workshop on Hot Topics in Cloud Computing. San Diego, CA, USA, 2009: 14-19.
[3] Schiffman J, Moyer T, Vijayakumar H, et al. Seeding clouds with trust anchors[C]//Proceedings of 2010 ACM Workshop on Cloud Computing Security Workshop. New York, USA, 2010: 43-46.
[4] Neisse R, Holling D, Pretschner A. Implementing trust in cloud infrastructures[C]//Proceedings of 2011 IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. Newport Beach, CA, USA, 2011: 524-533.
[5] Butt S, Lagar C, Srivastava A, et al. Self-service cloud computing[C]//Proceedings of 2012 ACM Conference on Computer and Communications Security. New York, USA, 2012: 253-264.
[6] Trusted Computing Group. TCG specification architecture overview, version 1.4 [EB/OL].(2007-08-02)[2013-04-22]. https://www.trustedcomputinggroup.org/resource/tcg_architecture_overview_version_14.
[7] Berger S, Caceres R, Goldman K, et al. vTPM: virtualizing the trusted platform module[C]//Proceedings of 2006 USENIX Security Symposium. Vancouver, Canada, 2006: 305-320.
[8] Reiner S, Zhang X, Jaeger T, et al. Design and implementation of a TCG-based integrity measurement architecture[C]//Proceedings of 2004 USENIX Security Symposium. San Diego, CA, USA, 2004: 16-32.
[9] 冯登国, 秦宇. 可信计算环境证明方法研究[J]. 计算机学报, 2008, 31(9): 1640-1652.
Feng Dengguo, Qin Yu. Research on attestation method for trust computing environment [J]. Chinese Journal of Computers, 2008, 31(9): 1640-1652.(in Chinese)
[10] 赵波, 张焕国, 李晶, 等. 可信PDA计算平台系统结构与安全[J]. 计算机学报, 2010, 33(1): 82-93.
Zhao Bo, Zhang Huanguo, Li Jing, et al. The system architecture and security structure of trusted PDA [J]. Chinese Journal of Computers, 2010, 33(1): 82-93.(in Chinese)
[11] Garfinkel T, Rosemblum M. A virtual machine introspection based architecture for intrusion detection [C]//Proceedings of 2003 Network and Distributed Systems Security Symposium. San Diego, CA, USA, 2003: 191-206.
[12] Dinaburg A, Royal P, Sharif M, et al. Ether: malware analysis via hardware virtualization extensions [C]//Proceedings of 2008 ACM Conference on Computer and Communication Security. Alexandria, VA, USA, 2008: 51-62.
[13] Shapeless. Poison ivy-remote administration tool [EB/OL].(2008-11-20)[2013-04-22]. http://www.poisonivy-rat.com/.
[14] Holy F. Hacker defender [EB/OL].(2005-02-04)[2013-04-22]. http://www.xfocus.net/tools/200502/994.html.
[15] Lord S. Linux rootkit 5 [EB/OL].(2007-02-02)[2013-04-22]. http://packstormsecurity.com/files/10533/.
[16] Stealth. Adore-ng rootkit [EB/OL].(2007-02-02)[2013-04-22]. http://stealth.openwall.net/rootkits/.
相似文献/References:
[1]徐小龙,熊婧夷,程春玲.基于云端计算架构的恶意代码联合防御机制[J].东南大学学报(自然科学版),2011,41(2):220.[doi:10.3969/j.issn.1001-0505.2011.02.002]
Xu Xiaolong,Xiong Jingyi,Cheng Chunling.Joint defense mechanism of malicious code based on cloud and client computing architecture[J].Journal of Southeast University (Natural Science Edition),2011,41(1):220.[doi:10.3969/j.issn.1001-0505.2011.02.002]
[2]周振吉,吴礼发,洪征,等.云计算环境下基于信任的虚拟机可信证明模型[J].东南大学学报(自然科学版),2015,45(1):31.[doi:10.3969/j.issn.1001-0505.2015.01.006]
Zhou Zhenji,Wu Lifa,Hong Zheng,et al.Trust based trustworthiness attestation model of virtual machines for cloud computing[J].Journal of Southeast University (Natural Science Edition),2015,45(1):31.[doi:10.3969/j.issn.1001-0505.2015.01.006]
[3]王旭阳,胡爱群,方昊.基于LWE的单层同态云计算方案[J].东南大学学报(自然科学版),2016,46(5):945.[doi:10.3969/j.issn.1001-0505.2016.05.008]
Wang Xuyang,Hu Aiqun,Fang Hao.Single-layer homographic cloud computing scheme based on LWE[J].Journal of Southeast University (Natural Science Edition),2016,46(1):945.[doi:10.3969/j.issn.1001-0505.2016.05.008]