1. Yague, M.I., Mana, A., Lopez, J., Troya, J.M.: Applying the Semantic Web Layers to Access Control. In: Proceedings of Database and Expert Systems Applications, pp. 622–626 (2003)
2. Loukides, M., Gorman, C.: Security Power Tools, pp. 101–129, 225–241. O’Reilly Media, Sebastopol (2007)
3. Gast, M.: 802.11 Wireless Networks: The Definitive Guide, 2nd edn. pp. 114–238. O’Reilly, Sebastopol (2005)
4. Sathu, H.: War driving dilemmas. In: Proceedings of the Nineteenth Annual Conference of the National Advisory Committee on Computing Qualifications, Wellington, pp. 237–242 (2006)
5. Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proceedings of the 13th Usenix Security Symposium, San Diego (2004)