1. ESD-TR-73-51;J. P. Anderson,1972
2. ISO/IEC. Information Technology-Security Techniques-Evaluation Criteria for IT Security, Part 1: Introduction and General Model. 2nd ed. 2005-10-01 (available at URL: http://standards.iso.org/ittf/PubliclyAvailableStandards/c040612_ISO_IEC_15408-1_2005(E).zip , accessed on April 14, 2006)
3. Trusted Computing Group. TCG Architecture Overview. V1. 2, 28 April 2004 (available at URL: https://www.trustedcomputinggroup.org/specs/IWG/TCG_1_0_Architecture_Overview.pdf , accessed on April 14, 2006)
4. Gates B. Trustworthy Computing. Wired News, Jan. 17, 2002 (available at URL: http://www.wired.com/news/business/0,1367,49826,00.html , accessed on April 14, 2006)
5. Lin C, Peng X H. Research on trustworthy networks. Chin J Comp (in Chinese), 2005, 28(5): 751–758