共 50 条
- [1] A multi-level security model based on trusted computing PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 448 - +
- [2] Trusted computing platform based executable code security inspecting model Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 112 - 116
- [4] Research on ATN-based trusted cloud computing security model Journal of Information and Computational Science, 2012, 9 (18): : 5945 - 5952
- [5] Security strategy of DRM based on trusted computing Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
- [6] A scheme based on trusted computing for terminal security PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
- [7] Trusted Model for Virtual Machine Security in Cloud Computing PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
- [8] An information flow security model to trusted computing system PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 310 - +
- [9] A Trusted Remote Attestation Model based on Trusted Computing 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509