Citation: | Xu Yixi, Zhang Qishan, Liu Jianweiet al. Design of trusted Java card code loading mechanism[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(1): 32-35. (in Chinese) |
[1] Kent S. Protecting externally supplied software in small computers . Massachusetts, USA: Massachusetts Institute of Technology, 1980[2] Whit S R, Comerford L D. ABYSS: a trusted architecture for software protection // Proceedings of the IEEE Symposium on Security and Privacy. New York, USA: IEEE Computer Society Press, 1987, 38-51[3] White S, Weingart S H, Arnold W, et al. Introduction to the citadel architecture: security in physically exposed environment . RC16672, 1991[4] Yee B S. Using secure coprocessors . Pittsburgh, USA: Department of Computer Science, Carnegie Mellon University, 1994[5] Sean W S.可信计算平台:设计与应用[M].冯登国,徐震,张立武译.北京: 清华大学出版社, 2006:54-55 Sean W S. Trusted computing platforms: design and applications [M]. Translated by Feng Dengguo, Xu Zhen and Zhang Liwu. Beijing: Tsinghua University Press, 2006:54-55(in Chinese)[6] Sun Microsystems, Inc. Java card platform specification2.2.2 . NewYork, U.S: Sun Microsystems, Inc, 2005. [7] Global Platform, Inc. Global platform card specification 2.1 . Readwood, U.S: GlobalPlatform, Inc , 2001.
|