1JФSANG A, KESER C, DIMITRAKOS T. Can we trust[A]. Proceedings of the Third International Conference on Trust 2005[C]. Springer Berlin / Heidelberg, 2005.93-107
2PATEL J, TEACY W T L, JENNINGS N R, et al. A probabilistic trust model for handling inaccurate reputation sources, gust management[A]. Third International Conference, iTrust 2005[C]. Paris, France,2005. 193-209.
3BETH T, BORCHERDING M, KLEIN B. Valuation of thust in open network[A]. Proceedings of the European Symposium on Research in Security(ESORICS)[C]. Brighton: Springer-Verlag, 1994. 3-18.
4JФSANG A. An algebra for assessing trust in certification chains[A]. Proceedings of NDSS'99, Network and Distributed System Security Symposium, the Internet Society[C]. San Diego, 1999.
5DYER J, LINDEMANN M, PEREZ R, et al. Building the IBM 4758 secure coprocessor[J]. IEEE Computer, 2001, 34(10): 57-66.
7Trusted computing group. TPM specification version 1.2. part 1 design principles[EB/OL].https://www.trustedcomputinggroup.org/specs/tpm/
8JAEGER T, SAILER R, SHANKAR U. PRIMA: policy-reduced integrity measurement architecture[A]. Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT 2006)[C]. 2006.
9RUSHBY J. Noninterference, Transitivity, and Channel-Control Security Policies[R]. CSL-92-02, Menlo Park: Stanford Research Institute, 1992.