JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (7): 77-88.doi: 10.6040/j.issn.1671-9352.2.2018.211
Previous Articles Next Articles
CLC Number:
1 | 国家密码管理局.GM/T 0012—2012可信计算-可信密码模块接口规范[S].北京:中国标准出版社, 2012: 11. |
State Cryptography Administration.GM/T 0012—2012, Trusted computing.Interface specification of trusted cryptography module[S]. Beijing: Standards Press of China, 2012: 11. | |
2 | 沈昌祥, 公备. 基于国产密码体系的可信计算体系框架[J]. 密码学报, 2015, 2 (5): 381- 389. |
SHEN Changxiang , GONG Bei . The innovation of trusted computing based on the domestic cryptography[J]. Journal of Cryptologic Research, 2015, 2 (5): 381- 389. | |
3 | 国家密码管理局.GM/T 0013—2012,可信计算-可信密码模块接口符合性测试规范[S].北京:中国标准出版社, 2012: 11. |
State Cryptography Administration.GM/T 0013—2012, Trusted computing.Trusted cryptography module interface compliance[S]. Beijing: Standards Press of China, 2012: 11. | |
4 | Trusted Computing Group. TCG PC client specific implementation specification for conventional BIOS[EB/OL]. (2005-07-13[2018-10-10]. https://trustedcomputinggroup.org/wp-content/uploads/PC-Client-Implementation-for-BIOS.pdf |
5 | WAN X, XIAO Z T, REN Y. Trusted virtual private datacenter: a model toward secure IaaS cloud[C]// 2012 Fourth International Conference on Multimedia Information Networking and Security. Nanjing: IEEE, 2012: 55-58. |
6 |
WANG Chunlu , LIU Chuanyi , LIU Bin , et al. DIV: dynamic integrity validation framework for detecting compromises on virtual machine based cloud services in real time[J]. China Communications, 2014, 11 (8): 15- 27.
doi: 10.1109/CC.2014.6911084 |
7 |
SUN Y Z , FANG H F , SONG Y , et al. TRainbow: a new trusted virtual machine based platform[J]. Frontiers of Computer Science in China, 2010, 4 (1): 47- 64.
doi: 10.1007/s11704-009-0076-5 |
8 | YU Z L , ZHANG W P , DAI H J . A trusted architecture for virtual machines on cloud servers with trusted platform module and certificate authority[J]. Journal of Signal Processing Systems, 2017, 86 (2/3): 327- 336. |
9 |
SINGH J , PASQUIER T , BACON J , et al. Twenty security considerations for cloud-supported internet of things[J]. IEEE Internet of Things Journal, 2016, 3 (3): 269- 284.
doi: 10.1109/JIOT.2015.2460333 |
10 | BERGER S, GOLDMAN K A, PEREZ R, et al. vTPM: virtualizing the trusted platform module[C]// Conference on Usenix Security Symposium. California: USENIX Association, 2006. |
11 | STUMPF F, ECKERT C. Enhancing trusted platform modules with hardware-based virtualization techniques[C]// 2008 Second International Conference on Emerging Security Information, Systems and Technologies. Cap Esterel: IEEE, 2008: 1-9. |
12 | CHEN C, RAJ H, SAROIU S, et al. cTPM: a cloud TPM for cross-device trusted applications[C]// NSDI′14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation. California: USENIX Association, 2014: 187-201. |
13 | Trusted Computing Group. Virtualized platform architecture specification[EB/OL]. (2011-9-27)[2018-10-12] https://trustedcomputinggroup.org/virtualized-trusted-platform-architecture-specification/. |
14 | DANEV B. Enabling secure VM-vTPM migration in private clouds[C]// Twenty-seventh Computer Security Applications Conference. Florida: DBLP, 2011. |
15 | HONG Z , WANG J , ZHANG H G . A trusted VM-vTPM live migration protocol in clouds[J]. Proceedings of International Workshop on Cloud Computing & Information Security, 2013, 52 (1391): 299- 302. |
[1] | HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75. |
[2] | ZHAO Dan-dan, CHEN Xing-shu, JIN Xin. A study on security enhancement technology for KVM Hypervisor [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 38-43. |
|