Bibliografia:

 

http://www.cl.cam.ac.uk/~fms27/papers/2003-stajano-shifting.pdf


http://www.gnu.org/philosophy/can-you-trust.html


http://www.eff.org/wp/trusted-computing-promise-and-risk


http://www.trustedcomputinggroup.org/files/resource_files/8770A217-1D09-3519-AD17543BF6163205/IWG_Architecture_v1_0_r1.pdf


http://www.trustedcomputinggroup.org/files/resource_files/AC14FDAE-1D09-3519-ADBC7444980B2884/ESG_White_Paper.pdf


http://www.trustedcomputinggroup.org/files/resource_files/AC1064FC-1D09-3519-AD8C2258D50F83DE/Implementing_Trusted_Computing_RK.pdf


http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html


http://www.army.mil/ciog6/news/500Day2006Update.pdf


http://www.linuxjournal.com/article/6633


^ Ferguson, Niels (August 2006). "AES-CBC + Elephant: A Disk Encryption Algorithm for Windows Vista" (PDF). Microsoft TechNet. Retrieved 2007-02-07.


http://www.schneier.com/crypto-gram-0208.html#1


http://www.linuxjournal.com/article/7055


http://www.blackhat.com/presentations/win-usa-04/bh-win-04-blight/bh-win-04-blight.pdf


http://www.opentc.net/

 

http://www.trustedcomputinggroup.org/


http://confiancacomputadores.com/faq/dicas/trusted-computing---seu-computador-confia-em-voce.html
 

Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh Terra: A Virtual Machine-Based Platform for Trusted Computing


Ravi Sandhu and Xinwen 
Zhang “
PeertoPeer Access Control Architecture Using Trusted Computing Technology
David Grawrock "The Intel Safer Computer Initiative," Intel Press, 2005.


Chris Mitchell, Trusted Computing, Institution of Electrical Engineers, 2005.