[1] 王慧强, 吕宏武, 赵倩, 董玺坤, 冯光升. 一种关键任务系统自律可信性模型与量化分析 [J]. 软件学报 2010. [2] FRAG A J S, POWELL D. A fault and intrusion tolerant file system [A]. Washington, D.C 1985. [3] DOBSON J E, RANDELL B. Building reliable secure systems out of unreliable insecure components [A]. Oakland 1986. [4] WU T, MALKI N M, BONEH D. Building intrusion tolerant applications [A]. Berkeley 1999. [5] MARSH M A, SCHNEIDER F B. CODEX:a robust and secure secret distribution system [J]. IEEE Trans on Dependable and Secure Computing 2001, 1(01). [6] LIDONG ZHOU, FRED B. SCHNEIDER, ROBBERT VAN RENESSE. COCA: A Secure Distributed Online Certification Authority [J]. ACM transactions on computer systems 2002, 4(4). [7] RABIN T. A simplified approach to threshold and proactive RSA [A]. London 1998. [8] JARECKI S, LYSYANSKAYA A. Adaptively secure threshold cryptography:introducing concurrency, removing erasures [A]. Berlin 2000. [9] CANETTI R, GENNARO R, JARECKI S. Adaptive security for threshold crypto systems [A]. London 1999. [10] CUKIER M, COURTNEY T, LYONS J. Providing intrusion tolerance with ITUA [A]. Washington DC 2002. [11] 吴庆涛, 华彬, 郑瑞娟, WU Qing-tao, HUA Bin, ZHENG Rui-juan. 基于自律反馈机制的入侵容忍模型 [J]. 微电子学与计算机 2011. |