[1] 荆继武, 刘丽敏. 电子认证走进2.0时代[J]. 信息安全研究, 2017, 3(006):573-576..
[2] 高志权. 云密码服务关键技术研究[J]. 数字技术与应用, 2019, v.37;No.351(09):191-193..
[3] 陈亚男 李晨旸 刘海峰 荣晓燕. 一种基于密码云的政务云密码应用[J]. 信息安全研究, 2020, 6(9): 0-0.
[4] 张晏. 云计算环境下密码资源池系统的应用[J]. 信息安全研究, 2016, 2(6): 558-561.
[5] Rob Stubbs.Achieving Agile Cryptography Management with Crypto Service Gateway (CSG)[EB/OL]. https://www.cryptomathic.com/news-events/blog/achieving-agile-cryptography-management-with-crypto-service-gateway-csg,2019-1-23
[6] Alteen N , Fisher J , Gerena C , et al. Encryption on AWS[M]// AWS Certified Developer Official Study Guide. 2019.
[7]Tanenbaum A S , Herder J N , Bos H . Can We Make Operating Systems Reliable and Secure?IEEE Computer, 2006, 39(5):44-51.
[8] Madhavapeddy A , Scott D J . Unikernels: The Rise of the Virtual Library Operating System[J]. Communications of the Acm, 2014, 57(1):61-69.
[9]Mortier R , Scott D , Gazagnaire T , et al. Unikernels: library operating systems for the cloud[J]. Acm Sigplan Notices, 2013, 41(1):461-472.
[10] Manco F , Lupu C , Schmidt F , et al. My VM is Lighter (and Safer) than your Container[C]// the 26th Symposium. ACM, 2017.
[11] Guan L , Lin J , Luo B , et al. Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory[J]. 2015.
[12] Ittai Anati, Shay Gueron, Simon P Johnson, and Vincent R Scarlata. Innovative technology for cpu based attestation and sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP, volume 13,
2013. .
[13] Tiago Alves and Don Felton. Trustzone: Integrated
hardware and software security. Information Quarterly,
3(4):18–24, 2004..
|