SADEGHI A R,STUBLE C.Property-based attestation for computing platforms:caring about properties,not mechanisms[C]∥Proceedings of the 2004 workshop on New security paradigms.New York:ACM,2004:67-77.
[2]
GEOFFREY S,MALCOLM D,SIGI G.TCG Infrastructure Working Group Architecture Part II-Integrity Management[EB/OL].(2006-11-17)[2009-06-10].http:∥www.trustedcomputinggroup.org/files/resource_files/87651761-1D09-3519-AD6C5B3E41547285/IWG_ArchitecturePartII_v1.0.pdf
[3]
张立强.可信网络连接的一些理论与关键技术研究[D].武汉:武汉大学计算机学院,2008.ZHANG Li-qiang.Research on some theories and key technologies of trusted network connection[D].Wuhan:ComputerSchool,Wuhan Univeristy,2008.(in Chinese)
[4]
SAATY TL.The Analytic Hierarchy Process[M].New York:McGraw-Hill Book Company,1980:32-54.
[5]
MARCHESINI J,SMITH S W,WILD O,et al.How I Learned to Stop Worrying and Love the Bear.Techinial ReportTR2003-476[EB/OL].(2003-12-15)[2009-06-10].http:∥www-inst.eecs.berkeley.edu/~cs161/fa08/papers/tcg.pdf.
[6]
REINER S,ZHANG Xiao-lan,TRENT J,et al.Design and Implementation of a TCG-based Integrity MeasurementArchitecture[C]∥Proceedings 13th USENIX Security Symposium.Berkerly:USENIX Association,2004:223-238.
[7]
TRENTJ,REINER S,UMESH S.PRIMA:Policy-Reduced Integrity Measurement Architecture[C]∥Proceedings of the11th ACM Symposium on Access Control Models and Technologies.NewYork:ACM,2006:19-28.
[8]
KUHN U,SELHORST M,STUBLE C.Realizing property-based attestation and sealing with commonly available hard-andsoftware[C]∥Proceedings of 2nd ACM Workshop on Scalable Trusted Computing.NewYork:ACM,2007:50-57.
[9]
STEPHENP M.Formalizing Trust as a Computational Concept[D].UK:Department of Computing Science and Mathematics,University of Stirling,1994:19-80.
[10]
MUI L,MOHTASHEMI M,HALBERSTADT A.A computational model of trust and reputation for e-businesses[C]∥Proceedings of the 35th Hawaii International Conference on System Science(HICSS).NewYork:IEEE,2002:2431-2439.
[11]
BETHT,BORCHERDING M,KLEIN B.Valuation of trust in open network[C]∥Proceedings of the European Symposiumon Research in Security(ESORICS).Brighton:Springer-Verlag,1994:3-18.
[12]
AUDUN J.A logic for uncertain probabilities[J].International Journal of Uncertainty,Fuzziness and Knowledge-BasedSystems,2001,9(3):279-311.