Citation: | Sun Bo and Sun Yufang. Research and Protection of the Digital Evidence Collecting System[J]. Journal of Computer Research and Development, 2005, 42(8): 1422-1426. |
[1] | Li Wei, Feng Wei, Qin Yu, Feng Dengguo. Scheme of Runtime Monitoring in Confidential Computing with Dynamic Integrity Measurement[J]. Journal of Computer Research and Development, 2024, 61(10): 2482-2500. DOI: 10.7544/issn1000-1239.202440480 |
[2] | Jia Qiaowen, Ma Haoyu, Li Yan, Wang Zheyu, Shi Wenchang. A Novel Integrity Measurement Architecture for Embedded Linux Systems[J]. Journal of Computer Research and Development, 2022, 59(10): 2362-2375. DOI: 10.7544/issn1000-1239.20220525 |
[3] | Zhao Xiaofei, Shi Zhongzhi, Liu Jianwei. Structural Integrity Checking Based on Logically Independent Fragment of Metadata[J]. Journal of Computer Research and Development, 2020, 57(9): 1961-1970. DOI: 10.7544/issn1000-1239.2020.20190493 |
[4] | Wang Huifeng, Li Zhanhuai, Zhang Xiao, Sun Jian, Zhao Xiaonan. A Self-Adaptive Audit Method of Data Integrity in the Cloud Storage[J]. Journal of Computer Research and Development, 2017, 54(1): 172-183. DOI: 10.7544/issn1000-1239.2017.20150900 |
[5] | Tan Shuang, He Li, Chen Zhikun, Jia Yan. A Method of Provable Data Integrity Based on Lattice in Cloud Storage[J]. Journal of Computer Research and Development, 2015, 52(8): 1862-1872. DOI: 10.7544/issn1000-1239.2015.20140610 |
[6] | Yuan Chunyang, Xu Junfeng, Zhu Chunge. A Trusted Recovery Model for Assurance of Integrity Policy Validity[J]. Journal of Computer Research and Development, 2014, 51(2): 360-372. |
[7] | Yang Tao, Wang Yonggang, Tang Liyong, Kong Lingbo, Hu Jianbin, Chen Zhong. A Practical Dynamic Integrity Protection Model[J]. Journal of Computer Research and Development, 2013, 50(10): 2082-2091. |
[8] | Shen Qingni, Du Hong, Wen Han, Qing Sihan. A Data Sealing Approach Based on Integrity Measurement Architecture[J]. Journal of Computer Research and Development, 2012, 49(1): 210-216. |
[9] | Li Bo, Li Jianxin, Hu Chunming, Wo Tianyu, and Huai Jinpeng. Software Integrity Verification Based on VMM-Level System Call Analysis Technique[J]. Journal of Computer Research and Development, 2011, 48(8): 1438-1446. |
[10] | Liu Changping, Fan Mingyu, and Wang Guangwei. Integrity Measurement Model According to Needs Under Open Network Environment[J]. Journal of Computer Research and Development, 2011, 48(2): 317-326. |