[1]PGP Corporation. PGP Desktop Storage[EB/OL].[20081115].http://www.pgp.com/products/packages/ desktop_storage.
[2]How the Encrypting File System Works[EB/OL].[20081115].http://technet2.microsoft.com/ WindowsServer/en/Library/997fdd9973ec40419cf41370739a59201033.mspx.
[3]Halcrow M A. eCryptfs: An EnterpriseClass Cryptographic Filesystem for Linux[C]∥Proc of the Linux Symp, 2005:201218.
[4]Halcrow M A. eCryptfs v0.1 Design Document[EB/OL].[20060324].http://ecryptfs.sf.net.
[5]DmCrypt: A DeviceMapper Crypto Target for Linux[EB/OL].[20080813].Available at:http://www.saout.de/misc/dmcrypt/.
[6]Zadok E, Badulescu I, Shender A.Cryptfs: A Stackable Vnode Level Encryption File System[R]. Tech Rep CUCS02198,Department of Computer Science, Columbia University, 1998.
[7]Sharma S, Moona R,Sanghi D. TransCrypt: A Secure and Transparent Encrypting File System for Enterprises[C]∥Proc of the 8th Int’l Symp on System and Information Security,2006.
[8]IEEE 1003.1e and 1003.2c. Draft Standard for Information Technology—Portable Operating System Interface (POSIX)—Part1: System Application Program Interface (API) and Part2: Shell and Utilities, draft17 (withdrawn)[S]. 1997.
[9]Riikonen P. RSA Algorithm[EB/OL].[20080314].http://iki.fi/ priikone/docs/rsa.pdf.
[10]Blake I, Seroussi G, Smart N. Elliptic Curves in Cryptography[M]. Cambridge University Press, 1999.
[11]Watson R N M. Introducing Supporting Infrastructure for Trusted Operating System Support in FreeBSD[EB/OL].[20000908].http://www.trustedbsd.org/docs.html.