[1] 卿斯汉. 可信计算的研究进展概述[J]. 信息网络安全,2008,(11):18-19. [2] 浅析缓冲区溢出的攻击和防范[EB/OL]. http://www.admin5.com/article/20110522/344595.shtml, 2014-05-07. [3] Kolawa Adam, Huizinga Dorota. Automated Defect Prevention: Best Practices in Software Management[M]. Wiley-IEEE Computer Society Press, 2007: 260. [4] 戚建淮,郑伟范,宋晶,等. 基于可信计算技术构建智能信息安全管理控制平台[J]. 信息网络安全,2009,(5):14-16. [5] 何立宝,黄刘生,杨威,等. 基于可信计算的P2P信任模型[J]. 信息网络安全,2009,(7):53-57. [6] G.Kim, E.Spafford. The design and implementation of tripwire: A file system integrity checker[C]//Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994. [7] Iglio P. Trustedbox: AKernel-level integrity checker[C]//ACSAC’99: Proceedings of the 15th Annual Computer Security Applications Conference, Phoenix: IEEE Computer Society, 1999. [8] Arbaugh W A, Farber D, Smith J. A secure and reliable bootstrap architecture[C]//Proceedings the IEEE Symposiumon Security and Privacy, Oakland: IEEE Computer Society, 1997. [9] 操作系统. 百度百科[EB/OL]. http://baike.baidu.com/link?url=IKSYrmvOXvTMEBxrs7T6SpSjG68elJkPTed3sFiRhdcBp_oJJqTM1yY7j8-K1I8inOBOf2d2pLKVl6rgUojRrlQlahd5XV8KaeB6z_F_OGG, 2014-05-07. [10] 朱凌云. 浅议可信计算在内网安全中的应用[J]. 信息网络安全,2008,(3):10-14. [11] TRUSTIE (Trustworthy software tools and integration environment) [EB/OL]. 2009. http://www.trustie.org,2009-05-16. [12] 代码安全审查[EB/OL]. http://www.cnblogs.com/jannock/archive/2008/07/15/1243404.html, 2014-05-07. [13] 陈震. 可信计算认证技术的研究[J]. 信息网络安全,2007,(7):6-8. [14] 沈昌祥,张焕国,王怀民,等. 可信计算的研究与发展[J]. 中国科学:信息科学,2010,40(2): 139-166. |