[1] 陈臣, 高军. 云计算环境下数字图书馆虚拟机安全部署策略研究 [J]. 现代情报, 2013, 33(7): 64-66.(Chen Chen, Gao Jun. Study for Virtual Machine Security Deployment Policy for Digital Library in Cloud Computing [J]. Modern Information,2013,33(7):64-66.)
[2] 陈臣, 马晓亭. 云计算环境下数字图书馆虚拟机资源分配及部署策略研究 [J]. 图书馆工作与研究, 2013(6): 46-48. (Chen Chen, Ma Xiaoting. Study on Virtual Resources' Allocation and Deployment Strategies of Digital Library in Cloud Computing Environment [J]. Library Work and Study, 2013(6): 46-48.)
[3] 袁援, 凌卉. 云计算技术驱动下构建数字图书馆虚拟化环境的探讨 [J]. 情报理论与实践, 2010, 33(12): 119-123, 128.(Yuan Yuan, Ling Hui. Exploration of Constructing the Virtualized Environment of Digital Library Driven by the Cloud Computing Technology [J]. Information Studies: Theory & Application, 2010,33(12): 119-123, 128.)
[4] 马晓亭, 陈臣. 云安全 2.0 技术体系下数字图书馆信息资源安全威胁与对策研究 [J]. 现代情报, 2011,31(3): 62-66.(Ma Xiaoting, Chen Chen. Research on Information Security Threats and Security Strategy of Digital Library under the Cloud Security 2.0 System Environment [J]. Modern Information, 2011,31(3):62-66.)
[5] 马晓亭, 陈臣. 云计算环境下数字图书馆信息资源安全威胁与对策研究 [J]. 情报资料工作, 2011(2): 55-59.(Ma Xiaoting, Chen Chen. On the Threat to the Security of Digital Library Information Resource and Its Tactics: Under the Environment of Cloud Computing [J]. Information and Documentation Services, 2011(2): 55-59.)
[6] 张叶红. 数字图书馆云计算安全架构及其管理策略 [J]. 图书馆学研究, 2010(11): 30-34. (Zhang Yehong. Cloud Computing Security Architecture and Policies of Digital Library [J]. Research on Library Science, 2010 (11): 30-34.)
[7] 林晓群. 可信技术在图书馆信息安全防护体系的应用研究 [J]. 农业图书情报学刊, 2010, 22(10): 62-64.(Lin Xiaoqun. Study on the Application of Trusted Computing in Library's Security Architecture [J].Jounal of Library and Information Sciences in Agriculture, 2010, 22(10): 62-64.)
[8] 王长全, 艾雰, 姚建文.云计算环境下数字图书馆信息资源安全策略研究 [J].情报杂志,2010,29(3):184-186,161.(Wang Changquan, Ai Fen, Yao Jianwen. Research on Information Security Strategy of Digital Library under the Cloud Computing Environment [J]. Journal of Intelligence, 2010, 29(3):184-186,161.)
[9] Tang K. Research on Security Strategies of Digital Library Based on Cloud Computing Platform [J]. Advanced Materials Research, 2013, 734-737: 3171-3174.
[10] McCune J M, Parno B, Perrig A, et al. How Low Can You Go? Recommendations for Hardware-supported Minimal TCB Code Execution [C]. In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, Seattle, USA. New York: ACM, 2008: 14-25.
[11] McCune J M, Parno B J, Perrig A, et al. Flicker: An Execution Infrastructure for TCB Minimization [C].In: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Glasgow. New York: ACM,2008: 315-328.
[12] McCune J M, Li Y, Qu N, et al. TrustVisor: Efficient TCB Reduction and Attestation [C]. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy. Washington D C: IEEE Computer Society, 2010:143-158.
[13] Schiffman J, Moyer T, Vijayakumar H, et al. Seeding Clouds with Trust Anchors [C]. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW'10), Chicago,USA. New York: ACM,2010: 43-46.
[14] Bertholon B, Varrette S, Bouvry P. CertiCloud: A Novel TPM-based Approach to Ensure Cloud IaaS Security [C]. In: Proceedings of the 4th International Conference on Cloud Computing(CLOUD 2011). Washington D C: IEEE Computer Society, 2011: 121-130.
[15] Eucalyptus Systems,Inc. Eucalyptus-Open Source AWS Compatible Private Clouds [EB/OL]. [2013-11-20]. http:// www.eucalyptus.com/.
[16] Trusted Computing Group. Trusted Platform Module [EB/OL]. [2013-11-20]. http://www.trustedcomputinggroup. org/developers/trusted_platform_module/.
[17] Berger S, Caceres R, Goldman K A, et al. vTPM: Virtualizing the Trusted Platform Module [C]. In: Proceedings of the 15th Conference on USENIX Security Symposium. USENIX Association Berkeley, 2006: Article No. 21. |