参考文献/References:
[1] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1):71-83.
Feng Dengguo, Zhang Min, Zhang Yan, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1):71-83.(in Chinese)
[2] 黄瑛, 石文昌. 云基础设施安全性研究综述[J]. 计算机科学, 2011, 38(7): 24-30,69.
Huang Ying, Shi Wenchang. Survey of research on cloud infrastructure[J]. Computer Science, 2011, 38(7): 24-30,69.(in Chinese)
[3] Trusted Computing Group. TCG specification architecture overview, version 1.4 [EB/OL].(2007-08)[2014-06-25]. http://www.trustedcomputinggroup.org/resources/tcg-architecture-overview-version-14/.
[4] Santos N, Gummadi K P, Rodrigues R. Towards trusted cloud computing[C]//Proceedings of 2009 Conference on Hot Topics in Cloud Computing. San Diego, CA, USA, 2009: 14-19.
[5] Krautheim F J. Private virtual infrastructure for cloud computing[C]//Proceedings of 2009 Workshop on Hot Topics in Cloud Computing. San Diego, CA, USA, 2009: 1-5.
[6] Krautheim F J, Phatak D S, Sherman A T. Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing[C]//2010 Trust and Trustworthy Computing. Berlin, Germany, 2010: 211-227.
[7] Schiffman J, Moyer T, Vijayakumar H, et al. Seeding clouds with trust anchors[C]//Proceedings of 2010 ACM Workshop on Cloud Computing Security Workshop. New York, USA, 2010: 43-46.
[8] Neisse R, Holling D, Pretschner A. Implementing trust in cloud infrastructures[C]//Proceedings of 2011 IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. Newport Beach, CA, USA, 2011: 524-533.
[9] Zhao Y, Cong P Y. On remote attestation based on trusted cloud computing[J]. Journal of Applied Sciences, 2013, 13(22): 5092-5098.
[10] Ateniese G, Camenisch J, Joye M, et al. A practical and provably secure coalition-resistant group signature scheme[C]//The 20th Annual International Cryptology Conference. Santa Barbara, CA, USA, 2000: 255-270.
[11] 陈泽文, 王继林, 黄继武, 等. ACJT群签名方案中成员撤销的高效实现[J]. 软件学报, 2005, 16(1): 151-157.
Chen Zewen, Wang Jilin, Huang Jiwu, et al. An efficient revocation algorithm in ACJT group signature[J]. Journal of Software, 2005, 16(1): 151-157.(in Chinese)
[12] Calheiros R N, Ranjan R, Beloglazov A, et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms[J]. Software:Practice and Experience, 2011, 41(1): 23-50.
[13] Medina A, Matta I, Byers J. BRITE: Boston University representative internet topology generator [EB/OL].(2001-03)[2014-06-25]. http://www.cs.bu.edu/fac/matta/Research/BRITE/.
相似文献/References:
[1]徐小龙,熊婧夷,程春玲.基于云端计算架构的恶意代码联合防御机制[J].东南大学学报(自然科学版),2011,41(2):220.[doi:10.3969/j.issn.1001-0505.2011.02.002]
Xu Xiaolong,Xiong Jingyi,Cheng Chunling.Joint defense mechanism of malicious code based on cloud and client computing architecture[J].Journal of Southeast University (Natural Science Edition),2011,41(1):220.[doi:10.3969/j.issn.1001-0505.2011.02.002]
[2]周振吉,吴礼发,洪征,等.云计算环境下的虚拟机可信度量模型[J].东南大学学报(自然科学版),2014,44(1):45.[doi:10.3969/j.issn.1001-0505.2014.01.009]
Zhou Zhenji,Wu Lifa,Hong Zheng,et al.Trustworthiness measurement model of virtual machine for cloud computing[J].Journal of Southeast University (Natural Science Edition),2014,44(1):45.[doi:10.3969/j.issn.1001-0505.2014.01.009]
[3]王旭阳,胡爱群,方昊.基于LWE的单层同态云计算方案[J].东南大学学报(自然科学版),2016,46(5):945.[doi:10.3969/j.issn.1001-0505.2016.05.008]
Wang Xuyang,Hu Aiqun,Fang Hao.Single-layer homographic cloud computing scheme based on LWE[J].Journal of Southeast University (Natural Science Edition),2016,46(1):945.[doi:10.3969/j.issn.1001-0505.2016.05.008]