P2P Access Control Architecture Using Trusted Computing Technology <A HREF="http://www.list.gmu.edu/confrnc/sacmat/2005-tc.pdf" target="_blank">http://www.list.gmu.edu/confrnc/sacmat/2005-tc.pdf</A>