1. Trusted Computing Group: Trusted Platform Module (TPM) specifications. http: /www. trustedcomputinggroup. org/ resources/tpm_main_specification.
2. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield: Xen and the art of virtualization, in Proc. 19th ACM symposium on Operating systems principles, (2003), pp.164-177.
3. F. Stumpf, M. Benz, M. Hermanowski, and C. Eckert: An Approach to a Trustworthy System Architecture Using Virtualization, in Lecture Notes in Computer Science, vol. 4610, (2007), pp.191-202.
4. S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn: vTPM: Virtualizing the Trusted Platform Module, in Proc. 15th USENIX Security Symposium, (2006), pp.305-320.
5. Trusted Computing Group. https: /www. trustedcomputinggroup. org.