登录 | 注册 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
一种基于可信计算的分布式使用控制系统
参考文献
  • [1] 聂晓伟,冯登国. 基于可信平台的一种访问控制策略框架--TXACML. 计算机研究与发展, 2008,10
  • [2] 徐震,沈丽红,汪丹. 一种可配置的可信引导系统. 中国科学院研究生院学报, 2008,5
  • [3] ALEXANDER PRETSCHNER;MANUEL HILTY;DAVID BASIN. DISTRIBUTED USAGE CONTROL. Communications of the ACM, 2006,9
  • [4] Park J;Sandhu R. The UCONABC usage control model. ACM Transactions on Information and System Security, 2004,01
  • [5] Sevin P E;Strasser M;Basin D. Securing the distribution and storage of secrets with trusted platform modules. Heraklion, 2007
  • [6] Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharing. Santa Barbara, 1991
  • [7] Abe M;Ohkubo M;Suzuki K. 1-out-of-n signatures from a variety of keys. Queenstown, 2002
  • [8] 聂晓伟. 可信平台访问控制研究. 中国科学院研究生院,北京, 2009
  • [9] Trusted Computing Group. . http://www.trustedcomput-ing.org
  • [10] Hilty M;Pretschner A;Basin D;Schaefer D,Walter T. A policy language for distributed usage control. Dresden, 2007
  • [11] OSCCA. Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing. http://www.oscca.gov.cn/Doc/6/News_1132.htm
  • [12] Security-Enhanced Linux. http://www.nsa.gov/selinux/
  • [13] Wright C;Cowan C;Smalley S;Morris J,Hartman G K. Linux security modules:General security support for the Linux kernel. Berkeley, 2002
  • [14] Alam M;Seifert M P;Li Q;Zhang X W. Usage control platformization via trustworthy SELinux. Tokyo,Japan, 2008
  • [15] Berthold A;Alam M;Breu R;Hafner M,Pretschner A,Seifert J P,Zhang X W. A technical architecture for enforcing usage control requirements in service-oriented architec-tures. Alexandria, 2007
  • [16] The TLS protocol:Version 1.0. http://www.ietf.org/rfe/rfc2246.txt
  • [17] Chen L Q;Lohr H;Manulis M;Sadeghi A R. Property-based attestation without a trusted third party. Taipei,China, 2008
  • [18] Brickell E;Camenisch J;Chen L Q. Direct anonymous attes-tation. Washington.D.C, 2004
  • [19] Chen L;Landfermann R;Lohr H;Rohe M,Sadeghi A,Stuble C. A protocol for property-based attestation. Alexandria, 2006
  • [20] Kyle D;Brustoloni J C. UCLinux; A Linux security module for trusted-computing-based usage controls enforcement. Alexandria, 2007
  • [21] Shoup V. Sequences of games:A tool for taming complexi ty in security proofs.Cryptology ePrint Archive,Report 2004/332. http://eprint.iacr.org/2004/332, 2004
  • [22] Sailer R;Zhange X L;Jaeger T;Doorn L V. Design and implementation of a TCG-based integrity measurement archi-tecture. San Diego, 2004
  • [23] Jaeger T;Sailer R;Shankar U. PRIMA:Policy-reduced integrity measurement architecture. Lake Tahoe, 2006
查看更多︾
相似文献 查看更多>>
34.226.244.70