[1] |
BERGER S , CáCERES R , GOLDMAN K A ,et al. vTPM:virtualizing the trusted platform module[C]// The 15th Conference on USENIX Security Symposium. 2006: 305-320.
|
[2] |
严飞, 龚玉凤, 于钊 . 基于硬件事务内存的 vTPM 安全保护方法:CN105678173[P].2016-06-15.
|
|
YAN F , GONG Y F , YU Z . vTPM security protection method based on hardware transaction memory[P]. CN105678173A,2016-06-15.
|
[3] |
严飞, 于钊, 张立强 ,等. vTSE:一种基于SGX的vTPM安全增强方案[J]. 工程科学与技术, 2017,49(2): 133-139.
|
|
YAN F , YU Z , ZHANG L Q ,et al. vTSE:a solution of SGX-based vTPM secure enhancement[J]. Advanced Engineering Sciences, 2017,49(2): 133-139.
|
[4] |
SHI Y , ZHAO B , YU Z ,et al. A Security-improved scheme for virtual TPM based on KVM[J]. Wuhan University Journal of Natural Sciences, 2015,20(6): 505-511.
|
[5] |
JIN X , CHEN X S , ZHAO C ,et al. Trusted attestation architecture on an infrastructure-as-a-service[J]. Tsinghua Science and Technology, 2017,22(5): 469-477.
|
[6] |
黄宇晴, 赵波, 肖钰 ,等. 一种基于KVM的vTPM虚拟机动态迁移方案[J]. 山东大学学报(理学版), 2017,52(6): 69-75.
|
|
HUANG Y Q , ZHAO B , XIAO Y ,et al. A vTPM-VM live migration scheme based on KVM[J]. Journal of Shandong University (Natural Science), 2017,52(6): 69-75.
|
[7] |
石源, 张焕国, 赵波 ,等. 基于SGX的虚拟机动态迁移安全增强方法[J]. 通信学报, 2017,38(9): 65-75.
|
|
SHI Y , ZHANG H G , ZHAO B ,et al. Security-enhanced live migration based on SGX for virtual machine[J]. Journal on Communications, 2017,38(9): 65-75.
|
[8] |
FAN P R , ZHAO B , SHI Y ,et al. An improved vTPM-VM live migration protocol[J]. Wuhan University Journal of Natural Sciences, 2015,20(6): 512-520.
|
[9] |
WAN X , ZHANG X F , CHEN L ,et al. An improved vTPM migration protocol based trusted channel[C]// International Conference on Systems and Informatics. 2012: 871-875.
|
[10] |
DANEV B , MASTI R J , KARAME G O ,et al. Enabling secure VM-VTPM migration in private clouds[C]// The 27th Annual Computer Security Applications Conference. 2011: 187-196.
|
[11] |
CHALLENER D , YODER K , CATHERMAN R ,et al. A practical guide to trusted computing[M]. Beijing: China Machine PressPress, 2008.
|
[12] |
BERGER S , GOLDMAN K , PENDARAKIS D ,et al. Scalable attestation:a step toward secure and trusted clouds[C]// IEEE International Conference on Cloud Engineering. 2015: 185-194.
|
[13] |
ARTHUR W , CHALLENER D , GOLDMAN K . A practical guide to TPM 20:using the trusted platform module in the new age of security[M]. Berkeley: ApressPress, 2015.
|
[14] |
CUCURULL J , GUASCH S . Virtual TPM for a secure cloud:fallacy or reality?[C]// The 13th Spanish Meeting on Cryptology and Information Security.Alicante. 2014: 197-202.
|
[15] |
杨永娇, 严飞, 毛军鹏 ,等. Ng-vTPM:新一代TPM虚拟化框架设计[J]. 武汉大学学报(理学版), 2015,61(2): 103-111.
|
|
YANG Y J , YAN F , MAO J P ,et al. Ng-vTPM:a next generation virtualized TPM architecture[J]. Wuhan University Journal of Natural Sciences, 2015,61(2): 103-111.
|
[16] |
王丽娜, 高汉军, 余荣威 . 基于信任扩展的可信虚拟执行环境构建方法研究[J]. 通信学报, 2011,32(9): 1-8.
|
|
WANG L N , GAO H J , YU R W . Research of constructing trusted virtual execution environment based on trust extension[J]. Journal on Communications, 2011,32(9): 1-8.
|
[17] |
HOHMUTH M , PETER M , H¨ARTIG H , .et al Reducing TCB size by using untrusted components—small kernels versus virtual-machine monitors[C]// The 11th workshop on ACM SIGOPS European Workshop. 2004:22.
|
[18] |
RAZAVI K , KIELMANN T . Scalable virtual machine deployment using VM image caches[C]// The International Conference on High Performance Computing,Networking,Storage and Analysis. 2013:65.
|
[19] |
MAYES K , MARKANTONAKIS K . Smart cards,tokens,security and applications[M]. New York: Springer PublishingPress, 2010.
|
[20] |
TCG Infrastructure Working Group. A CMC profile for AIK certificate enrollment[M]. Beaverton,Oregon: TCGPress, 2011.
|