Author:
Huang Jingru,Pei Xilong,Ou Dongxiu,Wang Jianmin
Reference26 articles.
1. openEuler (n.d.). https://openeuler.org/zh/. Accessed 17 Apr 2021
2. Xilong, P.: Cite it right: COMO, April 16 2021. https://gitee.com/tjopenlab/como
3. Piedad, F., Hawkins, M.: High availability: design, techniques, and processes. Prentice Hall Professional (2001)
4. Mitchell, C. (Ed.): Trusted computing, vol. 6. Iet (2005)
5. Rushby, J.M.: Design and verification of secure systems. ACM SIGOPS Operat. Syst. Rev. 15(5), 12–21 (1981)