1. Milojicic DS, Kalogeraki V, Lukose R, Nagaraja K, Pruyne J, Richard B, Rollins S, Xu ZC (2002) Peer-to-Peer Computing. HP Laboratories Palo Alto HPL-2002-57
2. Altman JE (2003) PKI Security for JXTA overlay networks. Sun Microsystem Palo Alto TR-I2-03-06
3. Khambatti M, Dasgupta P, Ryu KD (2004) A role-based trust model for peer-to-peer communities and dynamic coalitions. In: Proceedings of the Second IEEE International Information Assurance Workshop, Charlotte, North Carolina, pp 141–154
4. Li NH, Mitchell JC, Winsborough WH (2002) Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp 114–130
5. Winsborough WH, Seamons KE, Jones VE (2000) Automated trust negotiation. In: Proceedings of DARPA Information Survivability Conference and Exposition, Hilton Head, South Carolina, pp 88–102