共 11 条
[1]
Intel Virtualization Technol- ogy. Rich U,Gil N,Dion R, et al. Computer . 2005
[2]
Xen and the Art of Virtual- ization. Borham P,Dragoric B,Fraser K, et al. Proceedings of the 19th ACM Symposium on Operat- ing Systems Principles . 2003
[3]
Multi-Level Security Requirements for Hypervi- sors. Paul A. Computer Security Applications Conference, 21st Annual . 2005
[4]
TPM Main Specification. Trusted Computing Group. https://www.trustedcomputinggro up.or g/ specs/TPM . 2006
[5]
Design and Implementa- tion of a TCG-Based Integrity Measurement Architec- ture. Reiner S,Zhang X,Trent J,et al. Proceedings of the 13th Usenix Security Symposium . 2004
[6]
Security Model for the Next-Generation Secure Computing Base. Microsoft. http://www. Mi- crosoft.com/resources/ngscb/documents/NGSCB_Security_ Model.doc . 2006
[7]
Terra: A Virtual Machine-Based Platform for Trusted Computing. Tal G,Ben P,Jim C, et al. SOSP03 . 2003
[8]
Building a MAC-Based Security Architecture for the Xen Opensource Hypervi- sor. Reiner S,Jaeger T,Valdez E ,et al. http://www.acsac.org/2005/papers /171.pdf . 2005
[9]
Some Weaknesses of the TCB Model. Blakley B,Kienzle D. Proceedings of the 1997 IEEE Symposium on Security and Privacy . 1997
[10]
A VMM Security Kernel for the VAX Architecture. Paul A,Mary E,Douglas W, et al. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1990