1. Aucsmith, D., Fraunke, G.: Tamper Resistant Software: An Implementation. In: Proc. of International Workshop on Information Hiding, pp. 317–333 (1996)
2. Lecture Notes in Computer Science;C. English,2002
3. The EPAL 1.1.
http://www.zurich.ibm.com/security/enterpriseprivacy/epal/
4. Japan Network Security Association. Information Security Incident Survey Report ver.1.0,
http://www.jnsa.org/result/index.html
5. Karabulut, Y.: Towards a Next-Generation Trust Management Infrastructure for Open Computing Systems. In: SPPC 2004 (2004)