1. Köhntopp, Kristian/Köhntopp, Marit/Pfitzmann, Andreas: Sicherheit durch Open Source? Chancen und Grenzen, in: DuD 24/9 (2000), Vieweg, Wiesbaden 2000, pp. 508-513; http://www.koehntopp.de/marit/pub/opensource/
2. Neumann, Peter G.: Robust Nonproprietary Software, IEEE Symposium on Security and Privacy, Oakland CA May 15–17, 2000; http://www.csl.sri.com/neumann/ieee00+.pdf
3. Raymond, Eric S.: The Cathedral and the Bazaar, Version 1.51, August 2000; http://www.tuxedo.org/∼esr/writings/cathedral-bazaar/cathedral-bazaar/
4. Schneier, Bruce: Crypto-Gram September 15, 1999; http://www.counterpane.com/crypto-gram-9909.html#OpenSourceandSecurity
5. Thompson, Ken: Reflections on Trusting Trust, Turing Award Lecture, Communications of the ACM, Vol. 27, No. 8, August 1984, pp. 761–763; http://www.acm.org/classics/sep95/