8. Bibliografia
[1] - Safford, David. The Need for TCPA.  IBM. Outubro, 2002. 7p. Encontrado em: http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf
[2] - Anderson, Ross. ‘Trusted Computing’ Frequently Asked Questions. Version 1.1. University of Cambridge, Computer Laboratory. Agosto, 2003. Encontrado em: http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
[3] - Arbaugh, William A. The TCPA; What’s wrong; What’s right and what to do about. University of Maryland, Department of Computer Science and UMIACS. 20 de Julho, 2002. Encontrado em: http://www.cs.umd.edu/~waa/TCPA/TCPA-goodnbad.html
[4] - Safford, David. Clarifying Misinformation on TCPA.  IBM. Outubro, 2002. 7p. Encontrado em: http://www.research.ibm.com/gsal/tcpa/tcpa_rebuttal.pdf
[5] - Trusted Computing Platform Alliance (TCPA). Trusted Platform Module Protection Profile. Version 1.9.7. TCPA Membership. 01 de Julho, 2002. 64p. Encontrado em: http://www.trustedcomputing.org/home
[6] - Trusted Computing Platform Alliance (TCPA). TCPA PC Specific Implementation Specification. Version 1.00. TCPA Membership. 09 de Setembro, 2001. 71p. Encontrado em: http://www.trustedcomputing.org/home