Bibliografia:
http://www.cl.cam.ac.uk/~fms27/papers/2003-stajano-shifting.pdf
http://www.gnu.org/philosophy/can-you-trust.html
http://www.eff.org/wp/trusted-computing-promise-and-risk
http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
http://www.army.mil/ciog6/news/500Day2006Update.pdf
http://www.linuxjournal.com/article/6633
^ Ferguson,
Niels (August
2006). "AES-CBC
+ Elephant: A Disk Encryption Algorithm for Windows Vista" (PDF).
Microsoft TechNet. Retrieved 2007-02-07.
http://www.schneier.com/crypto-gram-0208.html#1
http://www.linuxjournal.com/article/7055
http://www.blackhat.com/presentations/win-usa-04/bh-win-04-blight/bh-win-04-blight.pdf
http://www.trustedcomputinggroup.org/
http://confiancacomputadores.com/faq/dicas/trusted-computing---seu-computador-confia-em-voce.html
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh “Terra: A Virtual Machine-Based Platform for Trusted Computing”
Ravi Sandhu and Xinwen Zhang
“PeertoPeer Access
Control Architecture Using Trusted Computing Technology”
David Grawrock "The
Intel Safer Computer Initiative,"
Intel Press, 2005.
Chris
Mitchell, Trusted Computing,
Institution of Electrical Engineers, 2005.