1. Hallappanavar, Vijay L., Birje, M.N.: Trust management in cloud computing. In: Cloud Security: Concepts, Methodologies, Tools, and Applications. IGI Global, pp. 1686–1711 (2019)
2. https://www.cverc.org.cn/head/zhaiyao/news20220629-FoxAcid.htm
3. Richard Clarke, R.K.: Cyberwar: the next threat to national security and what to do about it. In: ECCO (2011)
4. Zhang, F., Xu, M.D., Chao, H.C., Zhang, C., Liu, X.L., Hu, F.N.: Real-time trust measurement of software: behavior trust analysis approach based on noninterference. Ruan Jian Xue Bao/J. Softw. 30(8), 2268–2286 (2019)
5. Wang, Z., Zhuang, Y., Yan, Z.: Probe-based dynamic integrity measurement scheme for mobile devices using ARM trustzone. J. Chin. Comput. Syst. 42(11), 2422–2427 (2021)