1. Anderson, A., & Lockhart, H. (2004). SAML 2.0 profile of XACML. Retrieved 2013-08-05 from http://docs.oasis-open.org/xacml/access_control-xacml-2.0-saml_profile-spec-cd-02.pdf
2. Anderson, R. (2003). Trusted computing frequently asked questions. Version 1.1. Retrieved August 5, 2013, from http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
3. Anderson, R. (2003, July 13-16). Cryptography and competition policy — Issues with ‘trusted computing. In Proceedings of PODC ’03, Boston, MA (pp. 3–10). ACM.
4. Improving the TCPA specification
5. Arbaugh, W. A., Farber, D. J., & Smith, J. M. (1997). A secure and reliable bootstrap architecture. In Proceedings of the 1997 IEEE Symposium on Security and Privacy (S&P 1997) (pp. 65–71). Los Alamitos, CA: IEEE Computer Society Press.