1. Kong, G.: Advances on secure authentication and trusted admission protocols for cloud computing. J. Henan Univ. 47(1), 62–64 (2017)
2. Luo, D., Wu, X., Zheng, X., Hu, Y.: OOAP: a novel authorization protocol for access to sensitive data in trusted cloud computing platforms. Int. J. Secur. Appl. 8(6), 397–404 (2014)
3. Lai, Y., Chen, Y., Zou, Q., Liu, Z., Yang, Z.: Design and analysis on trusted network equipment access authentication protocol. Simul. Model. Pract. Theory 51(51), 157–169 (2015)
4. Wang, J., Zhang, Z., Chang, Y.: A security protocol for trusted access to cloud environment. Recent Adv. Electr. Electron. Eng. 8(2), 1–10 (2015)
5. Bo, Y., Guo, F.D., Yu, Q., Zhang, Y.J.: Secure access scheme of cloud services for trusted mobile terminals using trustzone. J. Softw. 27(6), 1366–1383 (2016)