1. Rau S (2006) The trusted computing platform emerges as industry’s first comprehensive approach to IT security (PDF). IDC executive brief. International Data Corporation. Retrieved on 07 Feb 2007
2. Oltsik J (2006) Trusted enterprise security: how the trusted computing group (TCG) will advance enterprise security (PDF). White Paper. Enterprise Strategy Group. Retrieved on 07 Feb 2007
3. Kay RL (2006) How to implement trusted computing. Endpoint Technologies Associates
4. McFadden T (2006) TPM matrix. http://www.tonymcfadden.net/tpmvendors_arc.html . Retrieved on 21 Mar 2008
5. Army CIO/G-6 500-day plan (PDF) (2006) Strategic goal n. 3, ‘deliver a joint netcentric information that enables warfighter decision superiority’. US Army. Retrieved on 2007-02-07