1. Rotondo S A. Trusted Computing Group [M]. Encyclopedia of Cryptography and Security. 2011: 1331–1331
2. Shen Chang-xiang, Zhang Huan-guo, Wang huai-min, et al. Research and development of trusted computing[J] Chinese Science: Information Science, 2010, 40(2): 139–166 (in Chinese).
3. Qu Yan-wen. Software Behavior [M]. Beijing: Publishing House of Electronics Industry, 2004 (in Chinese).
4. Shen Guo-hua, Huang Zhi-qiu, Qian Ju, et al. Research on Software Behavior Trustworthiness Evaluation Model and Its Implementation[J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(6): 553–561 (in Chinese).
5. Wang G, Wu J, Xu L, et al. Research on test adapter framework for distributed TTCN-3 test execution platform [J]. Acta Electronica Sinica, 2009, 37(1): 125–130 (in Chinese).