Sadeghi A,Stuble C,Winandy M.Property-based TPM virtualization[C]//Proceedings of the 11th International Conference on Information Security,ISC’08.Berlin:Springer-Verlag,2008:1-16.
[3]
Jayaram M R,Marforio C,Capkun S.An architecture for concurrent execution of secure environments in clouds[C]//Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop.New York:ACM Press,2013:11-22.
[4]
Santos N,Rodrigues R,Gummadi K P,et al.Policysealed data:A new abstraction for building trusted cloud services[C]//Security’12 Proceedings of the 21st USENIX Conference on Security Symposium.CA USA:USENIX Association,2012:10.
[5]
Li C,Wu X,Liu C,et al.An Implementation of Trusted Remote Attestation Oriented the Iaa SCloud[M].Berlin:Springer-Verlag,2013:194-202.□
Danev B,Masti R J,Karame,et al.Enabling secure VM-v TPM migration in private clouds[C]//Proceedings of the 27th Annual Computer Security Applications Conference.New York:ACM Press,2011:187-196.
[8]
Aslam M,Gehrmann C,Bjorkman M.Security and trust preserving VM migrations in public clouds[C]//Trust,Security and Privacy in Computing and Communications(Trust Com),2012 IEEE 11th International Conference on.New York:IEEE Press,2012:869-876.
[9]
Diffie W,Hellman M E.New directions in cryptography[J].Information Theory,IEEE Transactions on,1976,22(6):644-654.
[10]
Berger S,Caceres R,Goldman K,et al.VTPM:Virtualizing the trusted platform module[C]//Proceedings of the15th USENIX Security Symposium.Orlando:VSENIZ,2006:305-320.
[11]
England P,Loeser J:Para-virtualized TPM sharing[C]//Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technologies:Trusted Computing-Challenges and Applications,TRUST’08.Berlin:Springer-Verlag,2008:119-132.
[12]
Stumpf F,Eckert C.Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques[C]//Proceedings of the 2nd International Conference on Emerging Security Information,Systems and Technologies(SECURWARE’08).Washington DC:IEEE,2008:1-9.
[13]
Murray D G,Milos G,Hand S.Improving Xen security through disaggregation[C]//Proceedings of the Fourth ACM Sigplan//Sigops International Conference on Virtual Execution Environments.New York:ACM Press,2008:151-160.
[14]
Jin X,Wang L,Yu R,et al.Administrative domain:Security enhancement for virtual TPM[C]//Multimedia Information Networking and Security(MINES),2010 International Conference on.New York:IEEE Press,2010:767-771.
[15]
Yap J Y,Tomlinson A.Para-virtualizing the trusted platform module:An enterprise framework based on version2.0 specification[C]//5th International Conference,INTRUST 2013.Berlin:Springer-Verlag,2013:1-16.
Zhang F,Chen J,Chen H,et al.Cloudvisor:Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization[C]//Proceedings of the TwentyThird ACM Press Symposium on Operating Systems Principles.New York:ACM,2011:203-216.