1. Trust in the cloud;Abbadi;Cloud Security: Information Security Technical Report,2011
2. Enabling usage control through reputation objects: A discussion on e-commerce and the internet of services environments;Alnemr;Journal of Theoretical and Applied Electronic Commerce Research,2010
3. A practical guide to TPM 2.0: Using the new trusted platform module in the new age of security;Arthur,2015
4. A scheme for confidentiality protection of OpenID authentication mechanism;Ding,2010
5. Technical objects, social positions, and the transformation model of social activity;Faulkner;MIS Quarterly,2012