1. M. Curry, B. Marshall, R. E. Crossler, and J. Correia, “InfoSec Process Action Model (IPAM),” ACM SIGMIS Database: the DATABASE for Advances in Information Systems, vol. 49, no. SI, pp. 49–66, Apr. 2018, doi: 10.1145/3210530.3210535.
2. J. Allen, and J. Westby, "Governing for Enterprise Security (GES) Implementation Guide," Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, Technical Note CMU/SEI-2007-TN-020, 1-Aug-2007 [Online]. Available: https://doi.org/10.1184/R1/6574010.v1. [Accessed: 9-Apr-2024].
3. Fruhlinger Josh, “What is PKI? And how it secures just about everything online,” CSOOnline. 2021 May.
4. Adams Carlisle and Lloyd Steve, “Understanding PKI: concepts, standards, and deployment considerations,” Addison-Wesley Professional; 2003. p. 11–15. ISBN 978-0-672-32391-1.
5. Vacca Jhn R., “Public key infrastructure: building trusted applications and Web services,” CRC Press; 2004. p. 8. ISBN 978-0-8493-0822-2.