Trusted computing and open source
Tài liệu tham khảo
Biba, 1977
Fraser, 2000, LOMAC: low water-mark integrity protection for COTS environments
Fraser
Hall
Karger P, Austel V, Toll D. Using a mandatory secrecy and integrity policy on smart cards and mobile devices. EUROSMART Security Conference. Marseilles, France; 13–15 June 2000. p. 134–48.
Macdonald
Pozzo, 1987, An approach to containing computer viruses, Computers and Security, 6, 321, 10.1016/0167-4048(87)90067-8
Safford, 2003, Take control of TCPA, Linux Journal
Safford
Safford
Sailer, 2004, Design and implementation of a TCG-based integrity measurement architecture
SIMC Conference
Stüble, 2004
Strasser, 2004
van Doorn
Wash