Building a trusted computing base
Resources
115.
Papers
116.
Literature