Security Bootstrap Based on Trusted Computing
暂无分享,去创建一个
[1] Han Zhen,et al. Enhancing PC Security with a U-Key , 2006, IEEE Security & Privacy.
[2] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[3] James Hendricks,et al. Secure bootstrap is not enough: shoring up the trusted computing base , 2004, EW 11.
[4] Robert Thibadeau. Trusted Computing for Disk Drives and Other Peripherals , 2006, IEEE Security & Privacy.
[5] Hong Zhao,et al. Formal Analysis of Secure Bootstrap in Trusted Computing , 2007, ATC.
[6] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[7] Dominique Cansell,et al. Integration of Security Policy into System Modeling , 2007, B.
[8] Henry L. Owen,et al. Detecting and categorizing kernel-level rootkits to aid future detection , 2006, IEEE Security & Privacy Magazine.
[9] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .