正文:5.待研究的内容
TrustedJVM具体应用还需进一步完善和验证。可信计算远程动态验证系统已成雏形,但要成为完整和精确的模型,还需要构建易于应用开发的人性化统一接口。
参 考 文 献
[1]周明天,谭 良.可信计算及其进展.电子科技大学学报,2006,35(4),686-697
[2]T. Garfinkel, M. Rosenblum, and D. Boneh. Flexible os support and applications for trusted computing.In Proceedings of the 9th Workshop on Hot Topics in Operating Systems (HotOS-VIII), May 2003.
[3]B. Chen and R. Morris. Certifying program execution with secure processors. In USENIX HotOS Workshop, May 2003
[4]M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The digital distributed system security architecture. In
Proc. 12th NIST-NCSC National Computer Security Conference, pages 305-319, 1989.
[5] Vivek Haldar,Deepak Chandra,Michael Franz.Semantic Remote Attestation:A Virtual Machine Directed Approach to Trusted Computing.Information and Computer Science .University of California, Irvine
[6]Andrew W. Appel Daniel C. Wang. JVM TCB: Measurements of the Trusted Computing Base of Java Virtual Machines Princeton University. April 12, 2002
[7]John Marchesini, Sean W. Smith, Omen Wild, Josh Stabiner, Alex Barsamian.Open-Source Applications of TCPA Hardware. Department of Computer Science Dartmouth College. 6211 Hinman, Hanover, NH 03755 USA {First.Last}@dartmouth.edu
[8]Vivek Haldar ,Christian H. Stork ,Michael Franz.The Source is the Proof .University of California, Irvine .CA 92612 USA {vhaldar,cstork,franz} @ics.uci.edu
[9]He, J.; Gligor, V.D. .Information-flow analysis for covert-channel identification in multilevel secure operating systems .Computer Security Foundations Workshop III, 1990. Proceedings 12-14 June 1990 Page(s):139 - 148
[10]Foley, S.N.; Li Gong; Xiaolei Qian .A security model of dynamic labelling providing a tiered approach to verification .Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on 6-8 May 1996 Page(s):142 - 153
[11] ipper, E.H.; Melamed, B.; Morris, R.J.T.; Zave, P. .A multi-level secure message switch with minimal TCB: architectural outline and security analysis .Aerospace Computer Security Applications Conference, 1988., Fourth 12-16 Dec. 1988 Page(s):242 – 249
Blakley, B.; Kienzle, D.M. .Some weaknesses of the TCB model .Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on 4-7 May 1997 Page(s):3 - 5
[12]Basili, V.; Donzelli, P.; Asgari, S. .A unified model of dependability: capturing dependability in context .Software, IEEE Volume 21, Issue 6, Nov.-Dec. 2004 Page(s):19 - 25
[13]Iliev, A.; Smith, S.W. .Protecting client privacy with trusted computing at the server .Security & Privacy Magazine, IEEE Volume 3, Issue 2, March-April 2005 Page(s):20 - 28
3/3 首页 上一页 1 2 3