1. Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques;Aslam,2013
2. TOCTOU, traps, and trusted computing;Bratus,2008
3. Checklist for Red Hat 6 STIG Version 1, Release 2, http://web.nvd.nist.gov/view/ncp/repository, [Online; accessed 10.01.14].