共 50 条
- [2] An information flow security model to trusted computing system [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 310 - +
- [3] From trusted information security controls to a trusted information security environment [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 29 - 36
- [4] Mobile Security and Trusted Computing [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
- [6] Compiling Information-Flow Security to Minimal Trusted Computing Bases [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 2011, 6602 : 216 - 235
- [7] An Efficient Security Architecture for Trusted Computing [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
- [8] OSLO: Improving the security of trusted computing [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 229 - 237
- [9] A security model to protect sensitive information flows based on trusted computing technologies [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3646 - +