An Integrity Protection Model for the Keys of Trusted Platform Module
暂无分享,去创建一个
[1] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[2] D. Elliott Bell. Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .
[3] Timothy Fraser,et al. LOMAC: Low Water-Mark integrity protection for COTS environments , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Zhenfu Cao,et al. Survey of information security , 2007, Science in China Series F: Information Sciences.
[5] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[6] Ahmad-Reza Sadeghi,et al. Reconfigurable trusted computing in hardware , 2007, STC '07.
[7] Shen Chang-xiang,et al. Secrecy/Integrity Union MLS Policy Based on Trusting Computing , 2006 .