参考文献
[1]Changxiang S, Dawei Z, Jiqiang L, et al. The strategy of TC 3.0: A revolutionary evolution in trusted computing [J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(6): 5357[2]沈昌祥. 用可信计算3.0筑牢网络安全防线[J]. 信息安全研究, 2017, 3(4): 290298[3]联想控股有限公司等. GMT 0012—2012 可信计算 可信密码模块接口规范[S]. 北京: 中国标准出版社, 2012[4]王浩, 张明利, 王鹏彰. 基于TCM的安全增强机制在电力控制保护设备上的应用[J]. 工业控制计算机, 2022, 35(2): 3940, 43[5]刘强, 李巧, 鲍晓. 基于国产TCM芯片加密的边云协同数据采集架构[J]. 计算机与现代化, 2022 (8): 9498, 113[6]王冠, 袁华浩. 基于可信根服务器的虚拟TCM密钥管理功能研究[J]. 信息网络安全, 2016 (4): 1722[7]胡俊, 沈昌祥, 公备. 可信计算3.0工程初步[M]. 北京: 人民邮电出版社, 2017: 4649[8]孙瑜, 洪宇, 王炎玲. 基于TPCM可信根的主动免疫控制系统防护设计[J]. 信息技术与网络安全, 2021, 40(3): 1418[9]Ma Y, Ning Z, Zhang J, et al. A trusted connection architecture for edge computing[C] Proc of the 6th Int Conf on Image, Vision and Computing (ICIVC). Piscataway, NJ: IEEE, 2021: 464468[10]Hosseinzadeh S, Laurén S, Leppnen V. Security in containerbased virtualization through vTPM[C] Proc of the 9th Int Conf on Utility and Cloud Computing. New York: Association for Computing Machinery, 2016: 214219[11]张建标, 朱元曦, 胡俊, 等. 面向云环境的虚拟机可信迁移方案[J]. 网络与信息安全学报, 2018, 4(1): 614[12]Cohen J C, Acharya S. Incorporating hardware trust mechanisms in Apache Hadoop: To improve the integrity and confidentiality of data in a distributed Apache Hadoop file system: An information technology infrastructure and software approach[C] Proc of 2012 IEEE Globecom Workshops. Piscataway, NJ: IEEE, 2012: 769774[13]Mothukuri V, Parizi R M, Pouriyeh S, et al. A survey on security and privacy of federated learning [J]. Future Generation Computer Systems, 2021, 115: 619640[14]Fung C, Yoon C J, Beschastnikh I. Mitigating sybils in federated learning poisoning[J]. arXiv preprint, arXiv:1808.04866, 2018
|