共 6 条
- [1] TCG software stack specifications V1.2. http://www.trustedcomputing.com/ .
- [2] Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. Stumpf, F.,Eckert, C. Emerging Security Information, Systems and Technologies, 2008. SECURWARE ’’08. Second International Conference on . 2008
- [3] Optimizing the migration of virtual computers. Sapuntzakis C,Chandra R,Pfaff B,Chow J,Lam M S,Rosenblum M. Proceedings of the 5th Sym- posium on Operating Systems Design and implementa- tion . 2002
- [4] vtpm: Virtualizing the trustedplatform module. Berger, S,Cáceres, R,Goldman, K. A,Perez, R,Sailer, R,Doorn, L. USENIX Security . 2006
- [5] A protocol for property-based attestation. Chen Li-Qun,Landfermann Rainer,et al. Proceedings of the 1st ACM Workshop on Scalable Trusted Computing . 2006
- [6] When virtual is harder thanreal:security challenges in virtual machine based comput-ing environments. GARFINKEL T,MENDEL R. Proc of the 10th Workshop on HotTopics in Operating Systems . 2005