参考文献/References:
[1] 杨宗博,郭玉东. 提高存储资源利用率的存储虚拟化技术研究[J]. 计算机工程与设计,2008(12):3224-3226.
[2]CHENGMING L,KOJI O. Trusted Storage Virtualization in Cloud Computing[C]//Proceedings of the Asia-Pacific Advanced Network(APAN). Bandung,2014,38:128-132.
[3]常潘. 华东师范大学存储虚拟化改造[J]. 中国教育网络,2010(5):23-27.
[4]Sean W S. 可信计算平台:设计与应用[M]. 冯登国,徐霞,张立武,译. 北京:清华大学出版社,2015.
[5]DIRK R. Secure Communications with the One Time Pad Cipher Paper(English)[EB/OL]. http://www.snia.org,2008.[6]TAKESHI T,ATSUO O. Technologies of ETERNUS VS900 Storage Virtualization Switch[J]. Fujitsu scientific and technical journal,2006,42(1):17-18.
[7]李维林,朱志安,胡显涛. SVC存储虚拟化在容灾系统中的应用研究[J]. 数字技术与应用,2013(3):126-127.
[8]王楠,蒋金虎. 存储虚拟化技术研究与比较[J]. 洛阳师范学院学报,2007(2):73-76.
[9]SHANNON C. Communication theory of secrecy systems[J]. Bell system technical journal,1949,28(4):656-715.
[10]SAGE A W. Ceph:Reliable,Scalable,and High-Performance Distributed Storage[D]. Santa Cruz:University of California,2007.
[11]Swidish Institute of Computer Science Secure Systems Group. Trusted Computing and Secure Virtualization in Cloud Computing[R]. Paladi Nicolae,2012:5-8.