Citation: | YAN Lin, ZHANG Jianbiao, ZHANG Ai. Scheme of Trusted Bootstrap Based on General Smart Card[J]. JOURNAL OF MECHANICAL ENGINEERING, 2017, 43(1): 100-107. doi: 10.11936/bjutxb2015100063 |
[1] |
SHEN C X, ZHANG H G, WANG H M, et al.Research and development of trusted computing[J]. China Science: Information Sciences, 2010, 40(2): 139-166. (in Chinese)
|
[2] |
SHEN C X.Thinking and revelation of cyber space security strategy[J]. Financial Computerizing, 2014(6): 11-13. (in Chinese)
|
[3] |
TCG. TCG architecture overview[S/OL].[2009-11-05]. http: ∥www. trustedcomputinggroup. org/resources/tcg_architecture_overview_version_14.
|
[4] |
TCG. TCG PC specific implementation specification [S/OL].[2009-11-05]. http: ∥www. trustedcomputinggr oup. org/developers/pc_client/specifications.
|
[5] |
张焕国, 赵波. 可信计算[M]. 武汉: 武汉大学出版社, 2011: 61-69.
|
[6] |
HUI Z B.The theoretical construction and realization path of state cyberspace security strategy in China[J]. China Soft Science, 2012(5): 22-27. (in Chinese)
|
[7] |
BAI G D, HAO J A, WU J L, et al.Trust found: towards a formal foundation for model checking trusted computing platforms[J]. Lecture Notes in Computer Science, 2014, 8442: 110-126.
|
[8] |
石文昌. 信息系统安全概论[M]. 2版. 北京: 电子工业出版社, 2014: 252-258.
|
[9] |
WANG C, REN K, LOU W, et al.Toward publicly auditable secure cloud data storage services[J]. IEEE Network, 2010, 24(4): 19-24.
|
[10] |
TCG. TPM main specification part 1: design principles [S/OL].[2009-11-05]. http: ∥www. trustedcom putinggroup. org/resources/tpm_main_specification.
|
[11] |
LI H J, TIAN X X.Research of trust chain of operating system[M]. Berlin: Springer, 2009: 96-102.
|
[12] |
CONG W N, CAO K.Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(23): 1467-1479.
|
[13] |
邹德清, 羌卫中, 金海. 可信计算技术原理与应用[M]. 北京: 科学出版社, 2011: 64-72.
|
[14] |
ZAHNG X, HUANG Q, SHEN C X.A formal method based on noninterference for analyzing trust chain of trusted computing platform[J]. Chinese Journal of Computers, 2010, 33(1): 74-81. (in Chinese)
|
[15] |
沈昌祥. 信息安全导论[M]. 北京: 电子工业出版社, 2009: 163-165.
|