參考文獻 |
[1] Trusted Computing Group http://www.trustedcomputinggroup.org/
[2] TPM Main Specification Level 2 Version 1.2, Revision 116
[3] G. J. Popek and R. P. Goldberg. “Formal requirements for virtualizable third generation architectures”. ACM Symposium on Operating System Principles, pp. 121, 1973.
[4] S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. “vtpm: Virtualizing the trusted platform module”. USENIX Security Symposium, pp. 305-320, 2006.
[5] F. Stumpf and C. Eckert. “Enhancing trusted platform modules with hardware-based virtualization techniques”. International Conference on Emerging Security Information, Systems and Technologies, pp. 1–9, 2008.
[6] P. England and J. Loeser. “Para-virtualized TPM sharing”. International conference on Trusted Computing and Trust in Information Technologies, pp. 119-132, 2008.
[7] A. Sadeghi, C. Stüble, and M. Winandy. “Property-based TPM virtualization”, International conference on Information Security, pp. 1-16, 2008.
[8] V. Goyal, O. Pandey, A. Sahai, and B. Waters. “Attribute Based Encryption for Fine-Grained Access Control of Encrypted Data”. ACM conference on Computer and Communications Security, 2006.
[9] Amazon Elastic Compute Cloud http://aws.amazon.com/ec2/
[10] Microsoft Windows Azure http://azure.microsoft.com/zh-tw/
[11] M. Pearce, S. Zeadally, and R. Hunt. “Virtualization: Issues, security threats, and solutions”. ACM Computing Surveys, Vol. 45, no. 2, pp. 17:1-17:39, March 2013.
[12] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt and A. Warfield. “Live Migration of Virtual Machines”. Symposium on Networked Systems Design & Implementation, Vol. 2,pp. 273-286, 2005
[13] B. Danev, R. Masti, G. Karame and S. Capkun. “Enabling secure VM-vTPM migration in private clouds”. Annual Computer Security Applications Conference, pp. 187-196, 2011
[14] J. Oberheide, E. Cooke and F. Jahanian. “Exploiting live virtual machine migration”. Black Hat DC, Washington DC, February 2008.
[15] R. Anand , R. Regan and S. Sarswathi. ” Security issues in virtualization environment”. International Conference on Radar, Communication and Computing, pp. 254-256, 2012.
[16] P. Sharma, S. K. Sood and S. Kaur. “Security Issues in Cloud Computing”, Communications in Computer and Information Science, Vol. 169, pp. 36-45, 2011.
[17] TCG software stack http://www.trustedcomputinggroup.org/resources/tcg_software_stack_tss_specification
[18] Xen Source Repositories http://xenbits.xensource.com/
[19] H. Stamer and M. Strasser.“A Software-Based Trusted Platform Module Emulator”. Trusted Computing - Challenges and Applications, Vol. 4968, pp. 33-47, Austria, 2008.
[20] S. Gujrathi. “Heartbleed Bug: An OpenSSL Heartbeat Vulnerability”. International Journal of Computational Science and Engineering, Vol2, pp. 61-64, 2014.
[21] F. Sabahi. “Cloud computing security threats and responses”. International Conference on Communication Software and Networks, pp. 245-249, 2011.
[22] H. C. Lim, S. Babu, J. S. Chase and S. S. Parekh. “Automated control in cloud computing: challenges and opportunities”. Automated control for datacenters and clouds, pp. 13-18, 2009.
[23] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka and J. Molina. “Controlling data in the cloud: outsourcing computation without outsourcing control”. ACM workshop on Cloud computing security, pp. 85-90, 2009.
[24] A. Almutairi, M. Sarfraz, S. Basalamah, W.G. Aref and A. Ghafoor. “A Distributed Access Control Architecture for Cloud Computing”. Software, IEEE, Vol. 29, pp. 36-44, 2012.
[25] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt and A. Warfield. “Xen and the art of virtualization”. ACM Symposium on Operating Systems Principles, Vol. 37, pp. 164-177, 2003.
[26] J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum and E. W. Felten. “Lest we remember: cold-boot attacks on encryption keys”. Communications of the ACM - Security in the Browser, Vol. 52, pp. 91-98, 2009.
[27] TCG Software Stack (TSS) Specification, Version 1.2. http://www.trustedcomputinggroup.org/resources/tcg_software_stack_tss_specification
[28] TCG Architecture Overview, Version 1.4. http://www.trustedcomputinggroup.org/resources/tcg_architecture_overview_version_14
[29] R. Sailer, X. Zhang, T. Jaejer and L. Van Doorn. “Design and Implementation of a TCG-based Integrity Measurement Architecture”. USENIX Security Symposium, Vol13, pp. 16, 2004.
[30] Setting up TPM protected certificates using a Microsoft Certificate Authority. http://blogs.technet.com/b/pki/archive/2014/06/05/setting-up-tpm-protected-certificates-using-a-microsoft-certificate-authority-part-1-microsoft-platform-crypto-provider.aspx
[31] A Guide to Hardware-Based Endpoint Security. http://www.trustedcomputinggroup.org/resources/how_to_use_the_tpm_a_guide_to_hardwarebased_endpoint_security
[32] Direct Anonymous Attestation. http://www.zurich.ibm.com/security/daa/ |