1. W. Arthur and D. Challener. 2015. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress. W. Arthur and D. Challener. 2015. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress.
2. Victor Costan and Srinivas Devadas . 2016. Intel sgx explained.IACR Cryptol. ePrint Arch . 2016 , 86 (2016), 1–118. Victor Costan and Srinivas Devadas. 2016. Intel sgx explained.IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1–118.
3. Jordi Cucurull and Sandra Guasch . 2014. Virtual TPM for a secure cloud: fallacy or reality? ( 2014 ). Jordi Cucurull and Sandra Guasch. 2014. Virtual TPM for a secure cloud: fallacy or reality? (2014).
4. Cybersecurity and Infrastructure Security Agency. 2021. SECURITY GUIDANCE FOR 5G CLOUD INFRASTRUCTURES - Part II: Securely Isolate Network Resources. https://www.cisa.gov/sites/default/files/publications/Security_Guidance_For_5G_Cloud_Infrastructures_Part_II_Updated_508_Compliant.pdf. Accessed: 2023-05-13. Cybersecurity and Infrastructure Security Agency. 2021. SECURITY GUIDANCE FOR 5G CLOUD INFRASTRUCTURES - Part II: Securely Isolate Network Resources. https://www.cisa.gov/sites/default/files/publications/Security_Guidance_For_5G_Cloud_Infrastructures_Part_II_Updated_508_Compliant.pdf. Accessed: 2023-05-13.
5. Cybersecurity and Infrastructure Security Agency. 2023. Zero Trust Maturity Model. https://www.cisa.gov/zero-trust-maturity-model. Accessed: 2023-05-13. Cybersecurity and Infrastructure Security Agency. 2023. Zero Trust Maturity Model. https://www.cisa.gov/zero-trust-maturity-model. Accessed: 2023-05-13.