1. Altman, M.
(2012), “Auditing distributed preservation networks”, paper presented at the CNI Fall 2012 Membership Meeting (December).
2. Erdos, M.
and
Cantor, S.
(2005), “Shibboleth architecture”, available at: https://wiki.shibboleth.net/confluence/download/attachments/2162702/internet2-mace-shibboleth-arch-protocols-200509.pdf.
3. Giuli, T.
,
Maniatis, P.
,
Baker, M.
,
Rosenthal, D.S.H.
and
Roussopoulos, M.
(2005), “Resisting attrition attacks on a peer-to-peer system”, paper presented at the Usenix Annual Technical Conference, Anaheim, CA, April 10-15.
4. Maniatis, P.
,
Roussopoulos, M.
,
Giuli, T.
,
Rosenthal, D.S.H.
,
Baker, M.
and
Muliadi, Y.
(2003), “Preserving peer replicas by rate-limited sampled voting”, Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, October 19-22, pp. 44-59.
5. Rosenthal, D.S.H.
(2011), “A brief history of e-journal preservation”, available at: http://blog.dshr.org/2011/08/brief-history-of-e-journal-preservation.html.