A DRTM-Based Method for Trusted Network Connection
暂无分享,去创建一个
Dengguo Feng | Yu Qin | Wei Feng | Aimin Yu
[1] Ingo Bente,et al. Towards Trusted Network Access Control , 2009 .
[2] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[3] Dilsun Kirli Kaynar,et al. A Logic of Secure Systems and its Application to Trusted Computing , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[4] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[5] John C. Mitchell,et al. Protocol Composition Logic (PCL) , 2007, Computation, Meaning, and Logic.
[7] Teresa Fernandez,et al. Poof: no more viruses , 2007, SIGUCCS '07.
[8] Bernhard Kauer. OSLO: Improving the Security of Trusted Computing , 2007, USENIX Security Symposium.
[9] Cong Nie. Dynamic Root of Trust in Trusted Computing , 2007 .
[10] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].