1. Burdach, M.: Digital Forensics of the Physical Memory (2005), http://forensic.seccure.net/pdf/mburdach_digital_forensics_of_physical_memory.pdf
2. Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., Meder, S., Siebenlist, F.: X.509 Proxy Certificates for Dynamic Delegation. In: 3rd Annual PKI R&D Workshop, pp. 42–58 (2004)
3. Globus Toolkit 4.0 Release Manuals (2007), http://www.globus.org/toolkit/docs/4.0/
4. Foster, T., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Proc. 5th ACM Conference on Computer and Communications Security Conference, pp. 83–92 (1998)
5. Mallery, J.R.: Secure File Deletion, Fact or Fiction (2006), http://www.sans.org/rr/papers/27/631.pdf