T. T. Truong and C. Ignat, Log Auditing for Trust Assessment in Peerto-Peer Collaboration An Efficient Identity-Based Broadcast Signcryption Scheme, Proceedings of the 10th International Symposium on Parallel and Distributed Computing -ISPDC 2011 Proceedings of the Second International Conference on Knowledge and Systems Engineering, pp.207-214, 2010.

T. Thu-hien, S. Eitoku, T. Yamada, S. Muto, and M. Abe, An Ontological Approach to Lifelog Representation for Disclosure Control, Proceedings of the 13th IEEE International Symposium on Consumer Electronics -ISCE 2009, pp.934-938, 2009.

M. Abdalla and L. Reyzin, A New Forward-Secure Digital Signature Scheme, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '00, pp.116-129, 2000.
DOI : 10.1007/3-540-44448-3_10

A. Abdul-rahman and S. Hailes, Supporting trust in virtual communities, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p.6007, 2000.
DOI : 10.1109/HICSS.2000.926814

K. Aberer and Z. Despotovic, Managing trust in a peer-2-peer information system, Proceedings of the tenth international conference on Information and knowledge management , CIKM'01, 2001.
DOI : 10.1145/502585.502638

A. Abrahams, D. Eyers, and J. Bacon, An asynchronous rule-based approach for business process automation using obligations, Proceedings of the 2002 ACM SIGPLAN workshop on Rule-based programming , RULE '02, pp.93-103, 2002.
DOI : 10.1145/570186.570195

R. Accorsi, Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics, pp.94-110, 2009.
DOI : 10.1109/IMF.2009.18

R. Accorsi and T. Stocker, Automated privacy audits based on pruning of log Bibliography data, Proceedings of the 2008 12th Enterprise Distributed Object Computing Conference Workshops, EDOCW '08, pp.175-182, 2008.

J. William, N. J. Adams, and . Davis, Toward a decentralized trust-based access control system for dynamic collaboration, IEEE Workshop on Information Assurance and Security, p.324, 2005.

B. , T. Adler, and L. De-alfaro, A content-driven reputation system for the wikipedia, Proceedings of the 16th international conference on World Wide Web, WWW '07, pp.261-270, 2007.

M. Alberto and J. Márk, PeerSim: A scalable P2P simulator, Proceedings of the 9th International Conference on Peer-to-Peer, P2P'09, pp.99-100, 2009.

E. Carlos, E. Alchourron, and . Bulygin, The expressive conception of norms, New Studies in Deontic Logic, pp.95-124, 1981.

A. Arenas and M. Wilson, Contracts as Trust Substitutes in Collaborative Business, Computer, vol.41, issue.7, pp.80-83, 2008.
DOI : 10.1109/MC.2008.219

D. Artz and Y. Gil, A survey of trust in computer science and the Semantic Web, Web Semantics: Science, Services and Agents on the World Wide Web, vol.5, issue.2, pp.58-71, 2007.
DOI : 10.1016/j.websem.2007.03.002

R. Axelrod, The evolution of cooperation. Basic Books, 1984.

F. Baader, A. Bauer, and M. Lippmann, Runtime Verification Using a Temporal Description Logic, Proceedings of the 7th international conference on Frontiers of combining systems (FroCoS'09), pp.149-164, 2009.
DOI : 10.1006/inco.1994.1092

J. Bacon, K. Moody, and W. Yao, A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security, vol.5, issue.4, pp.492-540, 2002.
DOI : 10.1145/581271.581276

M. Ronald and O. Baecker, Readings in Human Computer Interaction: Toward the Year 2000, pp.741-782, 1995.

A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006.
DOI : 10.1109/SP.2006.32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610

A. Barth, J. Mitchell, A. Datta, and S. Sundaram, Privacy and Utility in Business Processes, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.279-294, 2007.
DOI : 10.1109/CSF.2007.26

D. Basin, V. Jugé, F. Klaedtke, and E. Z?linescu, Enforceable security policies revisited, Proceedings of the First international conference on Principles of Security and Trust (POST'12), pp.309-328, 2012.
DOI : 10.1007/978-3-642-28641-4_17

D. A. Basin, M. Harvan, F. Klaedtke, and E. Zalinescu, Monitoring usagecontrol policies in distributed systems, Eighteenth International Symposium on Temporal Representation and Reasoning (TIME'11), pp.88-95, 2011.

. Bazaar, Bazaar -Version Control System, 2007.

J. Benaloh and M. De-mare, One-Way Accumulators: A Decentralized Alternative to Digital Signatures, Workshop on the theory and application of cryptographic techniques on Advances in cryptology, EUROCRYPT '93, pp.274-285, 1994.
DOI : 10.1007/3-540-48285-7_24

J. Bentham, H. L. , and A. Hart, Of Laws in General, 1945.

E. Bertino, E. Ferrari, and A. C. Squicciarini, Trust-X: A Peer-to-Peer Framework for Trust Establishment, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.07, pp.827-842, 2004.
DOI : 10.1109/TKDE.2004.1318565

A. D. Birrell, R. Levin, M. D. Schroeder, and R. M. Needham, Grapevine: an exercise in distributed computing, Communications of the ACM, vol.25, issue.4, pp.260-274, 1982.
DOI : 10.1145/358468.358487

. Bitkeeper, BitKeeper -The Scalable Distributed Software Configuration Management System, 1997.

B. Blakley, The Emperor's old armor, Proceedings of the 1996 workshop on New security paradigms , NSPW '96, pp.2-16, 1996.
DOI : 10.1145/304851.304855

M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The keynote trust-management system version 2, 1999.
DOI : 10.17487/rfc2704

M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, p.164, 1996.
DOI : 10.1109/SECPRI.1996.502679

D. Achim, H. Brucker, and . Petritsch, Extending access control models with break-glass

S. Buchegger, D. Schiöberg, L. H. Vu, and A. Datta, PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, 2009.
DOI : 10.1145/1578002.1578010

J. Byun and N. Li, Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, pp.603-619, 2008.
DOI : 10.1007/s00778-006-0023-0

M. Cart and J. Ferrie, Asynchronous reconciliation based on operational transformation for P2P collaborative environments, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007), pp.127-138, 2007.
DOI : 10.1109/COLCOM.2007.4553821

URL : https://hal.archives-ouvertes.fr/lirmm-00189691

J. G. Cederquist, R. Corin, M. A. Dekker, S. Etalle, J. I. Hartog et al., Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007.
DOI : 10.1007/s10207-007-0017-y

URL : http://doc.utwente.nl/67014/1/Cederquist07audit.pdf

S. Chakraborty and I. Ray, TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006.
DOI : 10.1145/1133058.1133067

S. Chengzheng, J. Xiaohua, Z. Yanchun, Y. Yun, and C. David, Achieving Convergence, Causality Preservation, and Intention Preservation in Real-Time Cooperative Editing Systems, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.63-108, 1998.

K. W. Dickson, S. C. Chiu, S. Cheung, and . Till, A three-layer architecture for e-contract enforcement in an e-service environment, Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) -Track 3 HICSS '03, pp.74-75, 2003.

L. Cholvya and A. Hunterb, Merging requirements from a set of ranked agents. Knowledge-Based Systems, pp.113-126, 2003.

N. Cheun, Z. Chong, and . Peng, Secure audit logging with tamper-resistant hardware, 18th IFIP International Information Security Conference (IFIPSEC) IFIP Conference Proceedings, pp.73-84, 2003.

D. Clark, Face-to-Face with Peer-to-Peer Networking, Computer, vol.34, issue.1, pp.18-21, 2001.

M. J. Covington, W. Long, S. Srinivasan, A. K. Dev, M. Ahamad et al., Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01
DOI : 10.1145/373256.373258

A. Scott, D. S. Crosby, and . Wallach, Efficient data structures for tamper-evident logging, USENIX Security Symposium, pp.317-334, 2009.

F. Cuppens and N. Cuppens-boulahia, Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008.
DOI : 10.1007/s10207-007-0051-9

URL : https://hal.archives-ouvertes.fr/hal-01207773

. Darcs, Darcs -Version Control System, 2003.

A. Das and M. Islam, SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.2, pp.261-274, 2012.
DOI : 10.1109/TDSC.2011.57

A. Daskalopulu, T. Dimitrakos, and T. Maibaum, E-contract fulfilment and agents' attitudes, Proceedings of the ERCIM WG E-Commerce Workshop on The Role of Trust in e-Business, 2001.

D. Davis, F. Monrose, and M. K. Reiter, Time-Scoped Searching of Encrypted Audit Logs, ICICS, pp.532-545, 2004.
DOI : 10.1007/978-3-540-30191-2_41

. Debian, Debian Social Contract, 2004.

G. Decandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman et al., Dynamo, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.205-220, 2007.
DOI : 10.1145/1323293.1294281

A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson et al., Epidemic algorithms for replicated database maintenance, Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, PODC '87, pp.1-12, 1987.
DOI : 10.1145/43921.43922

G. Desanctis and R. B. Gallupe, A Foundation for the Study of Group Decision Support Systems, Management Science, vol.33, issue.5, pp.589-609, 1987.
DOI : 10.1287/mnsc.33.5.589

P. Dewan and H. Shen, Controlling access in multiuser interfaces, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.37-62, 1998.
DOI : 10.1145/274444.274446

P. Dewan and H. Shen, Flexible meta access-control for collaborative applications, Proceedings of the 1998 ACM conference on Computer supported cooperative work , CSCW '98, pp.247-256, 1998.
DOI : 10.1145/289444.289499

A. Dix, J. E. Finlay, G. D. Abowd, and R. Beale, Human-Computer Interaction, pp.466-467, 2003.

R. John and . Douceur, The sybil attack, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002.

P. Dourish, The Parting of the Ways: Divergence, Data Management and Collaborative Work, Proceedings of the fourth conference on European Conference on Computer- Supported Cooperative Work, ECSCW'95, pp.215-230, 1995.
DOI : 10.1007/978-94-011-0349-7_14

W. and K. Edwards, Policies and roles in collaborative applications, Proceedings of the 1996 ACM conference on Computer supported cooperative work , CSCW '96, pp.11-20, 1996.
DOI : 10.1145/240080.240175

C. A. Ellis, S. J. Gibbs, and G. Rein, Groupware: some issues and experiences, Communications of the ACM, vol.34, issue.1, pp.39-58, 1991.
DOI : 10.1145/99977.99987

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.105.6398

S. Etalle and W. H. Winsborough, A posteriori compliance control, Proceedings of the 12th ACM symposium on Access control models and technologies, SACMAT '07, pp.11-20, 2007.

F. David, D. R. Ferraiolo, and . Kuhn, Role-based access controls, Proceedings of the 15th National Computer Security Conference, pp.554-563, 1992.

F. David, R. Ferraiolo, S. Sandhu, D. R. Gavrila, R. Kuhn et al., Proposed nist standard for role-based access control, ACM Trans. Inf. Syst. Secur, vol.4, pp.224-274, 2001.

M. Friedemann, Virtual Time and Global States of Distributed Systems, Proceedings of the International Workshop on Parallel and Distributed Algorithms, pp.215-226, 1989.

K. Frikken, M. Atallah, and J. Li, Attribute-Based Access Control with Hidden Policies and Hidden Credentials, IEEE Transactions on Computers, vol.55, issue.10, pp.1259-1270, 2006.
DOI : 10.1109/TC.2006.158

. Gallery, Gallery -User Survey, 2009.

P. Gama and P. Ferreira, Obligation Policies: An Enforcement Platform, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05), pp.203-212, 2005.
DOI : 10.1109/POLICY.2005.18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.9009

D. Gambetta, Can We Trust Trust?, chapter Trust: Making and Breaking Cooperative Relations, This was originally published in hardcopy, pp.213-237, 1988.

D. Garg, L. Jia, and A. Datta, Policy auditing over incomplete logs, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.151-162, 2011.
DOI : 10.1145/2046707.2046726

C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, Flexible team-based access control using contexts, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.21-27, 2001.
DOI : 10.1145/373256.373259

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9949

Y. Gil and V. Ratnakar, Trusting Information Sources One Citizen at a Time, Proceedings of the First International Semantic Web Conference on The Semantic Web, ISWC '02, pp.162-176, 2002.
DOI : 10.1007/3-540-48005-6_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.9628

S. Gilbert and N. Lynch, Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services, ACM SIGACT News, vol.33, issue.2, p.2002, 2002.
DOI : 10.1145/564585.564601

C. Goh and A. Baldwin, Towards a more complete model of role, Proceedings of the third ACM workshop on Role-based access control , RBAC '98, pp.55-62, 1998.
DOI : 10.1145/286884.286898

T. Michael, R. Goodrich, A. Tamassia, and . Schwerin, Implementation of an authenticated dictionary with skip lists and commutative hashing, DARPA Information Survivability Conference and Exposition, p.1068, 2001.

G. Governatori and Z. Milosevic, A FORMAL ANALYSIS OF A BUSINESS CONTRACT LANGUAGE, International Journal of Cooperative Information Systems, vol.15, issue.04, pp.659-685, 2006.
DOI : 10.1142/S0218843006001529

A. Gutscher, A Trust Model for an Open, Decentralized Reputation System, Proceedings of the Joint iTrust and PST Conferences on Privacy Trust Management and Security, 2007.
DOI : 10.1007/978-0-387-73655-6_19

A. Haeberlen, P. Kouznetsov, and P. Druschel, PeerReview, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.175-188, 2007.
DOI : 10.1145/1323293.1294279

R. Hasan, R. Sion, and M. Winslett, The case of the fake picasso: Preventing history forgery with secure provenance, FAST, pp.1-14, 2009.

M. Hilty, A. Pretschner, C. Schaefer, and T. Walter, DUKE--Distributed Usage Control Enforcement, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), p.275, 2007.
DOI : 10.1109/POLICY.2007.17

J. E. Holt, Logcrypt: forward security and public verification for secure audit logs, Proceedings of the 2006 Australasian workshops on Grid computing and e-research

J. I. Hong and J. A. Landay, An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.177-189, 2004.
DOI : 10.1145/990064.990087

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.3857

T. Hvitved, F. Klaedtke, and E. Z?linescu, A trace-based model for multiparty contracts, Formal Languages and Analysis of Contract-Oriented Software (FLACOS'10), pp.72-98, 2012.
DOI : 10.1016/j.jlap.2011.04.010

C. Ignat, G. Oster, P. Molli, M. Cart, J. Ferrie et al., A comparison of optimistic approaches to collaborative editing of Wiki pages, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007), p.10, 2007.
DOI : 10.1109/COLCOM.2007.4553878

URL : https://hal.archives-ouvertes.fr/inria-00188329

R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely, Towards a Theory of Accountability and Audit, Proceedings of the 14th European conference on Research in computer security, ESORICS'09, pp.152-167, 2009.
DOI : 10.1145/1288783.1288786

R. Johansen and . Groupware, Computer Support for Business Teams, 1988.

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

A. Abou, E. Kalam, S. Benferhat, A. Miège, R. E. Baida et al., Organization based access control, Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '03, p.120, 2003.
URL : https://hal.archives-ouvertes.fr/hal-01483818

D. Sepandar, M. T. Kamvar, H. Schlosser, and . Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the 12th International Conference on World Wide Web, WWW 2003, pp.640-651, 2003.

K. Brent-byunghoon, S2D2: A Framework for Scalable and Secure Optimistic Replication, 2004.

B. Kang, R. Wilensky, and J. Kubiatowicz, The hash history approach for reconciling mutual inconsistency, ICDCS, pp.670-677, 2003.

R. Kaplan, Chapter 3 -A Matter of Trust in Information Security Management Handbook, 2004.

K. Karl, N. Mogens, and S. Vladimiro, A Logical Framework for Historybased Access Control and Reputation Systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008.

A. Kermarrec, A. I. Rowstron, M. Shapiro, and P. Druschel, The IceCube approach to the reconciliation of divergent replicas, Proceedings of the twentieth annual ACM symposium on Principles of distributed computing , PODC '01, pp.210-218, 2001.
DOI : 10.1145/383962.384020

URL : https://hal.archives-ouvertes.fr/hal-01248215

M. Koch, Design issues and model for a distributed multi-user editor, Computer Supported Cooperative Work (CSCW), vol.34, issue.no. 2, pp.359-378, 1996.
DOI : 10.1007/BF00750746

J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton et al., Oceanstore: An architecture for global-scale persistent storage, SIGARCH, pp.190-201, 2000.

A. Kumar, N. Karnik, and G. Chafle, Context sensitivity in role-based access control, ACM SIGOPS Operating Systems Review, vol.36, issue.3, pp.53-66, 2002.
DOI : 10.1145/567331.567336

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978.
DOI : 10.1145/359545.359563

A. Lazouski, F. Martinelli, and P. Mori, Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010.
DOI : 10.1016/j.cosrev.2010.02.002

K. Lefevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu et al., Limiting Disclosure in Hippocratic Databases, Proceedings of the Thirtieth international conference on Very large data bases, pp.108-119
DOI : 10.1016/B978-012088469-8.50013-9

B. Ley, V. Pipek, C. Reuter, and T. Wiedenhoefer, Supporting improvisation work in inter-organizational crisis management, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.1529-1538
DOI : 10.1145/2207676.2208617

N. Li and J. C. Mitchell, Datalog with Constraints: A Foundation for Trust Management Languages, Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages, PADL '03, pp.58-73, 2003.
DOI : 10.1007/3-540-36388-2_6

M. Lik, M. Mojdeh, and H. Ari, A Computational Model of Trust and Reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS 2002, pp.2431-2439, 2002.

E. Lippe and N. Van-oosterom, Operation-based merging, ACM SIGSOFT Software Engineering Notes, vol.17, issue.5, pp.78-87, 1992.
DOI : 10.1145/142882.143753

X. Liu, A. Datta, K. Rzadca, and E. Lim, StereoTrust, Proceeding of the 18th ACM conference on Information and knowledge management, CIKM '09, pp.7-16, 2009.
DOI : 10.1145/1645953.1645958

J. Loeliger, Collaborating with Git. Linux Magazine, 2006.

X. Luo, Y. Yang, and Z. Hu, Controllable Delegation Model Based on Usage and Trustworthiness, 2008 International Symposium on Knowledge Acquisition and Modeling, pp.745-749, 2008.
DOI : 10.1109/KAM.2008.14

D. Ma, Practical forward secure sequential aggregate signatures, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.341-352, 2008.
DOI : 10.1145/1368310.1368361

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.209.1054

D. Ma and G. Tsudik, Extended Abstract: Forward-Secure Sequential Aggregate Authentication, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.86-91, 2007.
DOI : 10.1109/SP.2007.18

D. Ma and G. Tsudik, A new approach to secure logging, TOS, vol.5, issue.1, 2009.

P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi et al., Depot, ACM Transactions on Computer Systems, vol.29, issue.4
DOI : 10.1145/2063509.2063512

D. Malkhi and D. B. Terry, Concise version vectors in winfs, Distributed Computing, pp.209-219, 2007.

P. Maniatis and M. Baker, Secure history preservation through timeline entanglement, Proceedings of the 11th USENIX Security Symposium, pp.297-312, 2002.

P. Maniatis and M. Baker, Authenticated append-only skip lists, Acta Mathematica, vol.137, pp.151-169, 2003.

S. Marinovic, R. Craven, J. Ma, and N. Dulay, Rumpole, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.73-82, 2011.
DOI : 10.1145/1998441.1998453

S. Paul and M. , Formalising Trust as a Computational Concept, 1994.

M. L. Mazurek, J. P. Arsenault, J. Bresee, N. Gupta, I. Ion et al., Access control for home data sharing, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.645-654, 2010.
DOI : 10.1145/1753326.1753421

G. Mella, E. Ferrari, E. Bertino, and Y. Koglin, Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems, ACM Transactions on Information and System Security, vol.9, issue.4, pp.421-460, 2006.
DOI : 10.1145/1187441.1187443

R. Charles and M. , Secrecy, authentication, and public key systems, p.8001972, 1979.

D. Le and M. , Formal methods as a link between software code and legal rules, Proceedings 9th International Conference on Software Engineering and Formal Methods, SEFM 2011, pp.3-18, 2011.

M. Daniel-le-métayer, V. Maarek, . Viet-triem, E. Tong, M. Mazza et al., Liability in software engineering: overview of the lise approach and illustration on a case study, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, ICSE 2010, pp.135-144, 2010.

Z. Milosevic, Enterprise Aspects of Open Distributed Systems, 1995.

Z. Milosevic, J. Audun, T. Dimitrakos, and M. A. Patton, Discretionary enforcement of electronic contracts, Proceedings. Sixth International Enterprise Distributed Object Computing, p.39, 2002.
DOI : 10.1109/EDOC.2002.1137695

. Mircrosoft, Sharepoint -Collaboration Software for the Enterprise, 2010.

C. Molina-jimenez, S. Shrivastava, and M. Strano, A model for checking contractual compliance of business interactions. Services Computing, IEEE Transactions on, vol.5, issue.2, pp.276-289

P. Molli, H. Skaf-molli, G. Oster, and S. Jourdain, SAMS: synchronous, asynchronous, multi-synchronous environments, The 7th International Conference on Computer Supported Cooperative Work in Design, pp.80-84, 2002.
DOI : 10.1109/CSCWD.2002.1047653

URL : https://hal.archives-ouvertes.fr/inria-00107571

A. Moretti, Why the logical hexagon? Logica Universalis, pp.69-107, 2012.
DOI : 10.1007/s11787-012-0045-x

R. Muriel and G. Jean, Log Auditing through Model-Checking, Proceedings of the 14th IEEE workshop on Computer Security Foundations, CSFW 2001, pp.220-234, 2001.

O. Bryan and . Sullivan, Mercurial: The Definitive Guide. O'Reilly Media, 2009.

J. Gordon, G. Pace, and . Schneider, Challenges in the specification of full contracts, Proceedings of the 7th International Conference on Integrated Formal Methods, IFM '09, pp.292-306, 2009.

K. Padayachee and J. H. Eloff, Enhancing Optimistic Access Controls with Usage Control, TrustBus'07, pp.75-82, 2007.
DOI : 10.1007/978-3-540-74409-2_10

K. Padayachee and J. H. Eloff, Adapting usage control as a deterrent to address the inadequacies of access controls, Computers & Security, vol.28, issue.7, pp.536-544, 2009.
DOI : 10.1016/j.cose.2009.03.003

C. Papamanthou, R. Tamassia, and N. Triandopoulos, Authenticated hash tables, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.437-448, 2008.
DOI : 10.1145/1455770.1455826

J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

J. Park and R. Sandhu, Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.57-64, 2002.
DOI : 10.1145/507711.507722

O. Perrin and C. Godart, A model to support collaborative work in virtual enterprises, Data & Knowledge Engineering, vol.50, issue.1, pp.63-86, 2004.
DOI : 10.1016/j.datak.2004.01.004

URL : https://hal.archives-ouvertes.fr/inria-00099590

. Demers, Flexible update propagation for weakly consistent replication, Proceedings of the sixteenth ACM symposium on Operating systems principles, SOSP '97, pp.288-301, 1997.

N. J. Zachary, R. Peterson, G. Burns, S. Ateniese, and . Bono, Design and implementation of verifiable audit trails for a versioning file system, Proceedings of the 5th USENIX conference on File and Storage Technologies, pp.20-20, 2007.

G. J. Popek, R. G. Guy, . Jr, T. W. Page, and J. S. Heidemann, Replication in Ficus distributed file systems, [1990] Proceedings. Workshop on the Management of Replicated Data, 1990.
DOI : 10.1109/MRD.1990.138235

D. Povey, Optimistic security, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.40-45, 2000.
DOI : 10.1145/335169.335188

N. Preguica, J. M. Marques, M. Shapiro, and M. Letia, A Commutative Replicated Data Type for Cooperative Editing, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.395-403, 2009.
DOI : 10.1109/ICDCS.2009.20

URL : https://hal.archives-ouvertes.fr/hal-01248203

M. Nuno, J. M. Preguiça, M. Marquès, M. Shapiro, and . Letia, A commutative replicated data type for cooperative editing, ICDCS, pp.395-403, 2009.

A. Pretschner, M. Hilty, and D. Basin, Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006.
DOI : 10.1145/1151030.1151053

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.3191

A. Pretschner, M. Hilty, D. A. Basin, C. Schaefer, and T. Walter, Mechanisms for usage control, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.240-244, 2008.
DOI : 10.1145/1368310.1368344

A. Pretschner, F. Schütz, C. Schaefer, and T. Walter, Policy Evolution in Distributed Usage Control, Electronic Notes in Theoretical Computer Science, vol.244, pp.109-123, 2009.
DOI : 10.1016/j.entcs.2009.07.042

C. Prisacariu and G. Schneider, A formal language for electronic contracts1 international conference on Formal methods for open object-based distributed systems, FMOODS'07, Proceedings of the 9th IFIP WG 6, pp.174-189, 2007.

C. Rahhal, H. Skaf-molli, P. Molli, and S. Weiss, Multi-synchronous Collaborative Semantic Wikis, Proceedings of the 10th International Conference on Web Information Systems Engineering, WISE '09, pp.115-129, 2009.
DOI : 10.1007/978-3-642-04409-0_17

URL : https://hal.archives-ouvertes.fr/inria-00432209

A. Rakesh, K. Jerry, S. Ramakrishnan, and X. Yirong, Hippocratic Databases, Proceedings of the 28th International Conference on Very Large Data Bases, VLDB 2002, pp.143-154, 2002.

P. Ravi, R. Michel, and S. Mukesh, An Adaptive Causal Ordering Algorithm Suited to Mobile Computing Environments, Journal of Parallel and Distributed Computing, vol.41, issue.2, pp.190-204, 1997.

P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, Reputation systems, Communications of the ACM, vol.43, issue.12, pp.45-48, 2000.
DOI : 10.1145/355112.355122

M. Ressel, D. Nitsche-ruhland, and R. Gunzenhäuser, An integrating, transformation-oriented approach to concurrency control and undo in group editors, Proceedings of the 1996 ACM conference on Computer supported cooperative work , CSCW '96, pp.288-297, 1996.
DOI : 10.1145/240080.240305

R. Riedl, Rethinking trust and confidence in european e-government linking the public sector with post-modern society, I3E, pp.89-108, 2004.

S. Rob, L. Seungjoon, and B. Bobby, Cooperative Peer Groups in NICE, Computer Networks, vol.50, issue.4, pp.523-544, 2006.

R. Rodrigues and P. Druschel, Peer-to-peer systems, Communications of the ACM, vol.53, issue.10, pp.72-82, 2010.
DOI : 10.1145/1831407.1831427

H. Roh, M. Jeon, J. Kim, and J. Lee, Replicated abstract data types: Building blocks for collaborative applications, Journal of Parallel and Distributed Computing, vol.71, issue.3, pp.354-368, 2011.
DOI : 10.1016/j.jpdc.2010.12.006

M. Roscheisen and T. Winograd, A communication agreement framework for access/action control, Proceedings 1996 IEEE Symposium on Security and Privacy, p.154, 1996.
DOI : 10.1109/SECPRI.1996.502678

J. Sabater and C. Sierra, REGRET, Proceedings of the fifth international conference on Autonomous agents , AGENTS '01, pp.194-195, 2001.
DOI : 10.1145/375735.376110

Y. Saito and M. Shapiro, Optimistic replication, ACM Computing Surveys, vol.37, issue.1, pp.42-81, 2005.
DOI : 10.1145/1057977.1057980

URL : https://hal.archives-ouvertes.fr/inria-00444768

R. Sandhu and X. Zhang, Peer-to-peer access control architecture using trusted computing technology, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.147-158, 2005.
DOI : 10.1145/1063979.1064005

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

S. Ravi, J. Sandhu, and . Park, Usage control: A vision for next generation access control, MMM-ACNS, pp.17-31, 2003.

D. C. Siegel and . Steere, Coda: A highly available file system for a distributed workstation environment, IEEE Trans. Comput, vol.39, issue.4, pp.447-459, 1990.

G. Saul, Personalizable groupware: accommodating individual roles and group differences, Proceedings of the second conference on European Conference on Computer- Supported Cooperative Work, ECSCW'91, pp.17-31, 1991.

G. Saul, R. Mark, W. Dave, and B. Ralph, Human and technical factors of distributed group drawing tools, Interacting with Computers, vol.4, issue.3, pp.364-392, 1992.

F. B. Schneider, Implementing fault-tolerant services using the state machine approach: a tutorial, ACM Computing Surveys, vol.22, issue.4, pp.299-319, 1990.
DOI : 10.1145/98163.98167

B. Schneier and J. Kelsey, Cryptographic support for secure logs on untrusted machines, Proceedings of the 7th conference on USENIX Security Symposium, pp.4-4, 1998.

B. Shand and J. Bacon, Policies in accountable contracts, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp.5-7, 2002.
DOI : 10.1109/POLICY.2002.1011296

B. Ninham and S. , Trust for resource control: Self-enforcing automatic rational contracts between computers, 2004.

M. Shapiro, N. Preguiça, C. Baquero, and M. Zawirski, Conflict-Free Replicated Data Types, Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems, pp.386-400, 2011.
DOI : 10.1007/978-3-642-24550-3_29

URL : https://hal.archives-ouvertes.fr/inria-00609399

H. Shen and P. Dewan, Access control for collaborative environments, Proceedings of the 1992 ACM conference on Computer-supported cooperative work , CSCW '92, pp.51-58, 1992.
DOI : 10.1145/143457.143461

R. G. Smith, The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver, IEEE Transactions on Computers, vol.29, issue.12, pp.291104-1113, 1980.
DOI : 10.1109/TC.1980.1675516

. Terry, Dealing with server corruption in weakly consistent, replicated data systems, Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, MobiCom '97, pp.234-240, 1997.

F. Stagni, A. Arenas, B. Aziz, and F. Martinelli, On Usage Control in Data Grids, In IFIPTM, vol.8, issue.4, pp.99-116, 2009.
DOI : 10.1145/1108906.1108908

G. Stevens and V. Wulf, A new dimension in access control, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.196-205, 2002.
DOI : 10.1145/587078.587106

G. Stevens and V. Wulf, Computer-supported access control, ACM Transactions on Computer-Human Interaction, vol.16, issue.3, pp.1-1226, 2009.
DOI : 10.1145/1592440.1592441

M. Suleiman, M. Cart, and J. Ferrié, Concurrent operations in a distributed and mobile collaborative environment, Proceedings 14th International Conference on Data Engineering, pp.36-45, 1998.
DOI : 10.1109/ICDE.1998.655755

K. Roshan and . Thomas, Team-based access control (tmac): a primitive for applying role-based access controls in collaborative environments, Proceedings of the second ACM workshop on Role-based access control, RBAC '97, pp.13-19, 1997.

K. Roshan, R. S. Thomas, and . Sandhu, Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management, Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, pp.166-181, 1998.

W. Vogels, Eventually consistent, Communications of the ACM, vol.52, issue.1, pp.40-44, 2009.
DOI : 10.1145/1435417.1435432

. Quang-hieu, M. Vu, B. C. Lupu, and . Ooi, Peer-to-Peer Computing, 2009.

K. Walsh and E. Sirer, Experience with an Object Reputation System for Peer-to-Peer Filesharing (Awarded Best Paper), NSDI, 2006.

S. Weiss, P. Urso, and P. Molli, Logoot-Undo: Distributed Collaborative Editing System on P2P Networks, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1162-1174, 2010.
DOI : 10.1109/TPDS.2009.173

URL : https://hal.archives-ouvertes.fr/hal-00450416

M. Winslett, N. Ching, V. Jones, and I. Slepchin, Assuring security and privacy for digital library transactions on the Web: client and server security policies, Proceedings of ADL '97 Forum on Research and Technology. Advances in Digital Libraries, pp.140-151, 1997.
DOI : 10.1109/ADL.1997.601210

T. Wobber, T. L. Rodeheffer, and D. B. Terry, Policy-based access control for weakly consistent replication, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.293-306, 2010.
DOI : 10.1145/1755913.1755943

R. Klein-woolthuis, B. Hillebrand, and B. Nooteboom, Trust, Contract and Relationship Development, Organization Studies, vol.26, issue.6, pp.813-840, 2005.
DOI : 10.1177/0170840605054594

G. H. Von and . Wright, Norm and action : a logical enquiry, 1963.

G. H. and V. Wright, Deontic logic. Mind, pp.1-15, 1951.

L. Xiong and L. Liu, PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.07, pp.843-857, 2004.
DOI : 10.1109/TKDE.2004.1318566

A. Altay, Y. , and P. Ning, Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems, Proceedings of the 2009 Annual Computer Security Bibliography Applications Conference, ACSAC '09, pp.219-228, 2009.

A. Yip, B. Chen, and R. Morris, Pastwatch: A distributed version control system, IN NSDI, 2006.

X. Zhang, Formal model and analysis of usage control, p.3221391, 2006.

X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu, A usage-based authorization framework for collaborative computing systems, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.180-189, 2006.
DOI : 10.1145/1133058.1133084

X. Zhang, M. Nakae, M. J. Covington, and R. S. Sandhu, Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM Transactions on Information and System Security, vol.11, issue.1
DOI : 10.1145/1330295.1330298