Log Auditing for Trust Assessment in Peerto-Peer Collaboration An Efficient Identity-Based Broadcast Signcryption Scheme, Proceedings of the 10th International Symposium on Parallel and Distributed Computing -ISPDC 2011 Proceedings of the Second International Conference on Knowledge and Systems Engineering, pp.207-214, 2010. ,
An Ontological Approach to Lifelog Representation for Disclosure Control, Proceedings of the 13th IEEE International Symposium on Consumer Electronics -ISCE 2009, pp.934-938, 2009. ,
A New Forward-Secure Digital Signature Scheme, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '00, pp.116-129, 2000. ,
DOI : 10.1007/3-540-44448-3_10
Supporting trust in virtual communities, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p.6007, 2000. ,
DOI : 10.1109/HICSS.2000.926814
Managing trust in a peer-2-peer information system, Proceedings of the tenth international conference on Information and knowledge management , CIKM'01, 2001. ,
DOI : 10.1145/502585.502638
An asynchronous rule-based approach for business process automation using obligations, Proceedings of the 2002 ACM SIGPLAN workshop on Rule-based programming , RULE '02, pp.93-103, 2002. ,
DOI : 10.1145/570186.570195
Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics, pp.94-110, 2009. ,
DOI : 10.1109/IMF.2009.18
Automated privacy audits based on pruning of log Bibliography data, Proceedings of the 2008 12th Enterprise Distributed Object Computing Conference Workshops, EDOCW '08, pp.175-182, 2008. ,
Toward a decentralized trust-based access control system for dynamic collaboration, IEEE Workshop on Information Assurance and Security, p.324, 2005. ,
A content-driven reputation system for the wikipedia, Proceedings of the 16th international conference on World Wide Web, WWW '07, pp.261-270, 2007. ,
PeerSim: A scalable P2P simulator, Proceedings of the 9th International Conference on Peer-to-Peer, P2P'09, pp.99-100, 2009. ,
The expressive conception of norms, New Studies in Deontic Logic, pp.95-124, 1981. ,
Contracts as Trust Substitutes in Collaborative Business, Computer, vol.41, issue.7, pp.80-83, 2008. ,
DOI : 10.1109/MC.2008.219
A survey of trust in computer science and the Semantic Web, Web Semantics: Science, Services and Agents on the World Wide Web, vol.5, issue.2, pp.58-71, 2007. ,
DOI : 10.1016/j.websem.2007.03.002
The evolution of cooperation. Basic Books, 1984. ,
Runtime Verification Using a Temporal Description Logic, Proceedings of the 7th international conference on Frontiers of combining systems (FroCoS'09), pp.149-164, 2009. ,
DOI : 10.1006/inco.1994.1092
A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security, vol.5, issue.4, pp.492-540, 2002. ,
DOI : 10.1145/581271.581276
Readings in Human Computer Interaction: Toward the Year 2000, pp.741-782, 1995. ,
Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.184-198, 2006. ,
DOI : 10.1109/SP.2006.32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610
Privacy and Utility in Business Processes, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.279-294, 2007. ,
DOI : 10.1109/CSF.2007.26
Enforceable security policies revisited, Proceedings of the First international conference on Principles of Security and Trust (POST'12), pp.309-328, 2012. ,
DOI : 10.1007/978-3-642-28641-4_17
Monitoring usagecontrol policies in distributed systems, Eighteenth International Symposium on Temporal Representation and Reasoning (TIME'11), pp.88-95, 2011. ,
Bazaar -Version Control System, 2007. ,
One-Way Accumulators: A Decentralized Alternative to Digital Signatures, Workshop on the theory and application of cryptographic techniques on Advances in cryptology, EUROCRYPT '93, pp.274-285, 1994. ,
DOI : 10.1007/3-540-48285-7_24
Of Laws in General, 1945. ,
Trust-X: A Peer-to-Peer Framework for Trust Establishment, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.07, pp.827-842, 2004. ,
DOI : 10.1109/TKDE.2004.1318565
Grapevine: an exercise in distributed computing, Communications of the ACM, vol.25, issue.4, pp.260-274, 1982. ,
DOI : 10.1145/358468.358487
BitKeeper -The Scalable Distributed Software Configuration Management System, 1997. ,
The Emperor's old armor, Proceedings of the 1996 workshop on New security paradigms , NSPW '96, pp.2-16, 1996. ,
DOI : 10.1145/304851.304855
The keynote trust-management system version 2, 1999. ,
DOI : 10.17487/rfc2704
Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, p.164, 1996. ,
DOI : 10.1109/SECPRI.1996.502679
Extending access control models with break-glass ,
PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, 2009. ,
DOI : 10.1145/1578002.1578010
Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, pp.603-619, 2008. ,
DOI : 10.1007/s00778-006-0023-0
Asynchronous reconciliation based on operational transformation for P2P collaborative environments, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007), pp.127-138, 2007. ,
DOI : 10.1109/COLCOM.2007.4553821
URL : https://hal.archives-ouvertes.fr/lirmm-00189691
Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007. ,
DOI : 10.1007/s10207-007-0017-y
URL : http://doc.utwente.nl/67014/1/Cederquist07audit.pdf
TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006. ,
DOI : 10.1145/1133058.1133067
Achieving Convergence, Causality Preservation, and Intention Preservation in Real-Time Cooperative Editing Systems, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.63-108, 1998. ,
A three-layer architecture for e-contract enforcement in an e-service environment, Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) -Track 3 HICSS '03, pp.74-75, 2003. ,
Merging requirements from a set of ranked agents. Knowledge-Based Systems, pp.113-126, 2003. ,
Secure audit logging with tamper-resistant hardware, 18th IFIP International Information Security Conference (IFIPSEC) IFIP Conference Proceedings, pp.73-84, 2003. ,
Face-to-Face with Peer-to-Peer Networking, Computer, vol.34, issue.1, pp.18-21, 2001. ,
Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01 ,
DOI : 10.1145/373256.373258
Efficient data structures for tamper-evident logging, USENIX Security Symposium, pp.317-334, 2009. ,
Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008. ,
DOI : 10.1007/s10207-007-0051-9
URL : https://hal.archives-ouvertes.fr/hal-01207773
Darcs -Version Control System, 2003. ,
SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.2, pp.261-274, 2012. ,
DOI : 10.1109/TDSC.2011.57
E-contract fulfilment and agents' attitudes, Proceedings of the ERCIM WG E-Commerce Workshop on The Role of Trust in e-Business, 2001. ,
Time-Scoped Searching of Encrypted Audit Logs, ICICS, pp.532-545, 2004. ,
DOI : 10.1007/978-3-540-30191-2_41
Debian Social Contract, 2004. ,
Dynamo, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.205-220, 2007. ,
DOI : 10.1145/1323293.1294281
Epidemic algorithms for replicated database maintenance, Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, PODC '87, pp.1-12, 1987. ,
DOI : 10.1145/43921.43922
A Foundation for the Study of Group Decision Support Systems, Management Science, vol.33, issue.5, pp.589-609, 1987. ,
DOI : 10.1287/mnsc.33.5.589
Controlling access in multiuser interfaces, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.37-62, 1998. ,
DOI : 10.1145/274444.274446
Flexible meta access-control for collaborative applications, Proceedings of the 1998 ACM conference on Computer supported cooperative work , CSCW '98, pp.247-256, 1998. ,
DOI : 10.1145/289444.289499
Human-Computer Interaction, pp.466-467, 2003. ,
The sybil attack, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002. ,
The Parting of the Ways: Divergence, Data Management and Collaborative Work, Proceedings of the fourth conference on European Conference on Computer- Supported Cooperative Work, ECSCW'95, pp.215-230, 1995. ,
DOI : 10.1007/978-94-011-0349-7_14
Policies and roles in collaborative applications, Proceedings of the 1996 ACM conference on Computer supported cooperative work , CSCW '96, pp.11-20, 1996. ,
DOI : 10.1145/240080.240175
Groupware: some issues and experiences, Communications of the ACM, vol.34, issue.1, pp.39-58, 1991. ,
DOI : 10.1145/99977.99987
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.105.6398
A posteriori compliance control, Proceedings of the 12th ACM symposium on Access control models and technologies, SACMAT '07, pp.11-20, 2007. ,
Role-based access controls, Proceedings of the 15th National Computer Security Conference, pp.554-563, 1992. ,
Proposed nist standard for role-based access control, ACM Trans. Inf. Syst. Secur, vol.4, pp.224-274, 2001. ,
Virtual Time and Global States of Distributed Systems, Proceedings of the International Workshop on Parallel and Distributed Algorithms, pp.215-226, 1989. ,
Attribute-Based Access Control with Hidden Policies and Hidden Credentials, IEEE Transactions on Computers, vol.55, issue.10, pp.1259-1270, 2006. ,
DOI : 10.1109/TC.2006.158
Gallery -User Survey, 2009. ,
Obligation Policies: An Enforcement Platform, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05), pp.203-212, 2005. ,
DOI : 10.1109/POLICY.2005.18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.9009
Can We Trust Trust?, chapter Trust: Making and Breaking Cooperative Relations, This was originally published in hardcopy, pp.213-237, 1988. ,
Policy auditing over incomplete logs, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.151-162, 2011. ,
DOI : 10.1145/2046707.2046726
Flexible team-based access control using contexts, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.21-27, 2001. ,
DOI : 10.1145/373256.373259
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9949
Trusting Information Sources One Citizen at a Time, Proceedings of the First International Semantic Web Conference on The Semantic Web, ISWC '02, pp.162-176, 2002. ,
DOI : 10.1007/3-540-48005-6_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.9628
Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services, ACM SIGACT News, vol.33, issue.2, p.2002, 2002. ,
DOI : 10.1145/564585.564601
Towards a more complete model of role, Proceedings of the third ACM workshop on Role-based access control , RBAC '98, pp.55-62, 1998. ,
DOI : 10.1145/286884.286898
Implementation of an authenticated dictionary with skip lists and commutative hashing, DARPA Information Survivability Conference and Exposition, p.1068, 2001. ,
A FORMAL ANALYSIS OF A BUSINESS CONTRACT LANGUAGE, International Journal of Cooperative Information Systems, vol.15, issue.04, pp.659-685, 2006. ,
DOI : 10.1142/S0218843006001529
A Trust Model for an Open, Decentralized Reputation System, Proceedings of the Joint iTrust and PST Conferences on Privacy Trust Management and Security, 2007. ,
DOI : 10.1007/978-0-387-73655-6_19
PeerReview, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.175-188, 2007. ,
DOI : 10.1145/1323293.1294279
The case of the fake picasso: Preventing history forgery with secure provenance, FAST, pp.1-14, 2009. ,
DUKE--Distributed Usage Control Enforcement, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), p.275, 2007. ,
DOI : 10.1109/POLICY.2007.17
Logcrypt: forward security and public verification for secure audit logs, Proceedings of the 2006 Australasian workshops on Grid computing and e-research ,
An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.177-189, 2004. ,
DOI : 10.1145/990064.990087
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.3857
A trace-based model for multiparty contracts, Formal Languages and Analysis of Contract-Oriented Software (FLACOS'10), pp.72-98, 2012. ,
DOI : 10.1016/j.jlap.2011.04.010
A comparison of optimistic approaches to collaborative editing of Wiki pages, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007), p.10, 2007. ,
DOI : 10.1109/COLCOM.2007.4553878
URL : https://hal.archives-ouvertes.fr/inria-00188329
Towards a Theory of Accountability and Audit, Proceedings of the 14th European conference on Research in computer security, ESORICS'09, pp.152-167, 2009. ,
DOI : 10.1145/1288783.1288786
Computer Support for Business Teams, 1988. ,
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
Organization based access control, Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '03, p.120, 2003. ,
URL : https://hal.archives-ouvertes.fr/hal-01483818
The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the 12th International Conference on World Wide Web, WWW 2003, pp.640-651, 2003. ,
S2D2: A Framework for Scalable and Secure Optimistic Replication, 2004. ,
The hash history approach for reconciling mutual inconsistency, ICDCS, pp.670-677, 2003. ,
Chapter 3 -A Matter of Trust in Information Security Management Handbook, 2004. ,
A Logical Framework for Historybased Access Control and Reputation Systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008. ,
The IceCube approach to the reconciliation of divergent replicas, Proceedings of the twentieth annual ACM symposium on Principles of distributed computing , PODC '01, pp.210-218, 2001. ,
DOI : 10.1145/383962.384020
URL : https://hal.archives-ouvertes.fr/hal-01248215
Design issues and model for a distributed multi-user editor, Computer Supported Cooperative Work (CSCW), vol.34, issue.no. 2, pp.359-378, 1996. ,
DOI : 10.1007/BF00750746
Oceanstore: An architecture for global-scale persistent storage, SIGARCH, pp.190-201, 2000. ,
Context sensitivity in role-based access control, ACM SIGOPS Operating Systems Review, vol.36, issue.3, pp.53-66, 2002. ,
DOI : 10.1145/567331.567336
Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978. ,
DOI : 10.1145/359545.359563
Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010. ,
DOI : 10.1016/j.cosrev.2010.02.002
Limiting Disclosure in Hippocratic Databases, Proceedings of the Thirtieth international conference on Very large data bases, pp.108-119 ,
DOI : 10.1016/B978-012088469-8.50013-9
Supporting improvisation work in inter-organizational crisis management, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.1529-1538 ,
DOI : 10.1145/2207676.2208617
Datalog with Constraints: A Foundation for Trust Management Languages, Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages, PADL '03, pp.58-73, 2003. ,
DOI : 10.1007/3-540-36388-2_6
A Computational Model of Trust and Reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS 2002, pp.2431-2439, 2002. ,
Operation-based merging, ACM SIGSOFT Software Engineering Notes, vol.17, issue.5, pp.78-87, 1992. ,
DOI : 10.1145/142882.143753
StereoTrust, Proceeding of the 18th ACM conference on Information and knowledge management, CIKM '09, pp.7-16, 2009. ,
DOI : 10.1145/1645953.1645958
Collaborating with Git. Linux Magazine, 2006. ,
Controllable Delegation Model Based on Usage and Trustworthiness, 2008 International Symposium on Knowledge Acquisition and Modeling, pp.745-749, 2008. ,
DOI : 10.1109/KAM.2008.14
Practical forward secure sequential aggregate signatures, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.341-352, 2008. ,
DOI : 10.1145/1368310.1368361
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.209.1054
Extended Abstract: Forward-Secure Sequential Aggregate Authentication, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.86-91, 2007. ,
DOI : 10.1109/SP.2007.18
A new approach to secure logging, TOS, vol.5, issue.1, 2009. ,
Depot, ACM Transactions on Computer Systems, vol.29, issue.4 ,
DOI : 10.1145/2063509.2063512
Concise version vectors in winfs, Distributed Computing, pp.209-219, 2007. ,
Secure history preservation through timeline entanglement, Proceedings of the 11th USENIX Security Symposium, pp.297-312, 2002. ,
Authenticated append-only skip lists, Acta Mathematica, vol.137, pp.151-169, 2003. ,
Rumpole, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.73-82, 2011. ,
DOI : 10.1145/1998441.1998453
Formalising Trust as a Computational Concept, 1994. ,
Access control for home data sharing, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.645-654, 2010. ,
DOI : 10.1145/1753326.1753421
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems, ACM Transactions on Information and System Security, vol.9, issue.4, pp.421-460, 2006. ,
DOI : 10.1145/1187441.1187443
Secrecy, authentication, and public key systems, p.8001972, 1979. ,
Formal methods as a link between software code and legal rules, Proceedings 9th International Conference on Software Engineering and Formal Methods, SEFM 2011, pp.3-18, 2011. ,
Liability in software engineering: overview of the lise approach and illustration on a case study, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, ICSE 2010, pp.135-144, 2010. ,
Enterprise Aspects of Open Distributed Systems, 1995. ,
Discretionary enforcement of electronic contracts, Proceedings. Sixth International Enterprise Distributed Object Computing, p.39, 2002. ,
DOI : 10.1109/EDOC.2002.1137695
Sharepoint -Collaboration Software for the Enterprise, 2010. ,
A model for checking contractual compliance of business interactions. Services Computing, IEEE Transactions on, vol.5, issue.2, pp.276-289 ,
SAMS: synchronous, asynchronous, multi-synchronous environments, The 7th International Conference on Computer Supported Cooperative Work in Design, pp.80-84, 2002. ,
DOI : 10.1109/CSCWD.2002.1047653
URL : https://hal.archives-ouvertes.fr/inria-00107571
Why the logical hexagon? Logica Universalis, pp.69-107, 2012. ,
DOI : 10.1007/s11787-012-0045-x
Log Auditing through Model-Checking, Proceedings of the 14th IEEE workshop on Computer Security Foundations, CSFW 2001, pp.220-234, 2001. ,
Mercurial: The Definitive Guide. O'Reilly Media, 2009. ,
Challenges in the specification of full contracts, Proceedings of the 7th International Conference on Integrated Formal Methods, IFM '09, pp.292-306, 2009. ,
Enhancing Optimistic Access Controls with Usage Control, TrustBus'07, pp.75-82, 2007. ,
DOI : 10.1007/978-3-540-74409-2_10
Adapting usage control as a deterrent to address the inadequacies of access controls, Computers & Security, vol.28, issue.7, pp.536-544, 2009. ,
DOI : 10.1016/j.cose.2009.03.003
Authenticated hash tables, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.437-448, 2008. ,
DOI : 10.1145/1455770.1455826
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004. ,
DOI : 10.1145/984334.984339
Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.57-64, 2002. ,
DOI : 10.1145/507711.507722
A model to support collaborative work in virtual enterprises, Data & Knowledge Engineering, vol.50, issue.1, pp.63-86, 2004. ,
DOI : 10.1016/j.datak.2004.01.004
URL : https://hal.archives-ouvertes.fr/inria-00099590
Flexible update propagation for weakly consistent replication, Proceedings of the sixteenth ACM symposium on Operating systems principles, SOSP '97, pp.288-301, 1997. ,
Design and implementation of verifiable audit trails for a versioning file system, Proceedings of the 5th USENIX conference on File and Storage Technologies, pp.20-20, 2007. ,
Replication in Ficus distributed file systems, [1990] Proceedings. Workshop on the Management of Replicated Data, 1990. ,
DOI : 10.1109/MRD.1990.138235
Optimistic security, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.40-45, 2000. ,
DOI : 10.1145/335169.335188
A Commutative Replicated Data Type for Cooperative Editing, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.395-403, 2009. ,
DOI : 10.1109/ICDCS.2009.20
URL : https://hal.archives-ouvertes.fr/hal-01248203
A commutative replicated data type for cooperative editing, ICDCS, pp.395-403, 2009. ,
Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006. ,
DOI : 10.1145/1151030.1151053
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.3191
Mechanisms for usage control, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.240-244, 2008. ,
DOI : 10.1145/1368310.1368344
Policy Evolution in Distributed Usage Control, Electronic Notes in Theoretical Computer Science, vol.244, pp.109-123, 2009. ,
DOI : 10.1016/j.entcs.2009.07.042
A formal language for electronic contracts1 international conference on Formal methods for open object-based distributed systems, FMOODS'07, Proceedings of the 9th IFIP WG 6, pp.174-189, 2007. ,
Multi-synchronous Collaborative Semantic Wikis, Proceedings of the 10th International Conference on Web Information Systems Engineering, WISE '09, pp.115-129, 2009. ,
DOI : 10.1007/978-3-642-04409-0_17
URL : https://hal.archives-ouvertes.fr/inria-00432209
Hippocratic Databases, Proceedings of the 28th International Conference on Very Large Data Bases, VLDB 2002, pp.143-154, 2002. ,
An Adaptive Causal Ordering Algorithm Suited to Mobile Computing Environments, Journal of Parallel and Distributed Computing, vol.41, issue.2, pp.190-204, 1997. ,
Reputation systems, Communications of the ACM, vol.43, issue.12, pp.45-48, 2000. ,
DOI : 10.1145/355112.355122
An integrating, transformation-oriented approach to concurrency control and undo in group editors, Proceedings of the 1996 ACM conference on Computer supported cooperative work , CSCW '96, pp.288-297, 1996. ,
DOI : 10.1145/240080.240305
Rethinking trust and confidence in european e-government linking the public sector with post-modern society, I3E, pp.89-108, 2004. ,
Cooperative Peer Groups in NICE, Computer Networks, vol.50, issue.4, pp.523-544, 2006. ,
Peer-to-peer systems, Communications of the ACM, vol.53, issue.10, pp.72-82, 2010. ,
DOI : 10.1145/1831407.1831427
Replicated abstract data types: Building blocks for collaborative applications, Journal of Parallel and Distributed Computing, vol.71, issue.3, pp.354-368, 2011. ,
DOI : 10.1016/j.jpdc.2010.12.006
A communication agreement framework for access/action control, Proceedings 1996 IEEE Symposium on Security and Privacy, p.154, 1996. ,
DOI : 10.1109/SECPRI.1996.502678
REGRET, Proceedings of the fifth international conference on Autonomous agents , AGENTS '01, pp.194-195, 2001. ,
DOI : 10.1145/375735.376110
Optimistic replication, ACM Computing Surveys, vol.37, issue.1, pp.42-81, 2005. ,
DOI : 10.1145/1057977.1057980
URL : https://hal.archives-ouvertes.fr/inria-00444768
Peer-to-peer access control architecture using trusted computing technology, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.147-158, 2005. ,
DOI : 10.1145/1063979.1064005
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Usage control: A vision for next generation access control, MMM-ACNS, pp.17-31, 2003. ,
Coda: A highly available file system for a distributed workstation environment, IEEE Trans. Comput, vol.39, issue.4, pp.447-459, 1990. ,
Personalizable groupware: accommodating individual roles and group differences, Proceedings of the second conference on European Conference on Computer- Supported Cooperative Work, ECSCW'91, pp.17-31, 1991. ,
Human and technical factors of distributed group drawing tools, Interacting with Computers, vol.4, issue.3, pp.364-392, 1992. ,
Implementing fault-tolerant services using the state machine approach: a tutorial, ACM Computing Surveys, vol.22, issue.4, pp.299-319, 1990. ,
DOI : 10.1145/98163.98167
Cryptographic support for secure logs on untrusted machines, Proceedings of the 7th conference on USENIX Security Symposium, pp.4-4, 1998. ,
Policies in accountable contracts, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp.5-7, 2002. ,
DOI : 10.1109/POLICY.2002.1011296
Trust for resource control: Self-enforcing automatic rational contracts between computers, 2004. ,
Conflict-Free Replicated Data Types, Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems, pp.386-400, 2011. ,
DOI : 10.1007/978-3-642-24550-3_29
URL : https://hal.archives-ouvertes.fr/inria-00609399
Access control for collaborative environments, Proceedings of the 1992 ACM conference on Computer-supported cooperative work , CSCW '92, pp.51-58, 1992. ,
DOI : 10.1145/143457.143461
The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver, IEEE Transactions on Computers, vol.29, issue.12, pp.291104-1113, 1980. ,
DOI : 10.1109/TC.1980.1675516
Dealing with server corruption in weakly consistent, replicated data systems, Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, MobiCom '97, pp.234-240, 1997. ,
On Usage Control in Data Grids, In IFIPTM, vol.8, issue.4, pp.99-116, 2009. ,
DOI : 10.1145/1108906.1108908
A new dimension in access control, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.196-205, 2002. ,
DOI : 10.1145/587078.587106
Computer-supported access control, ACM Transactions on Computer-Human Interaction, vol.16, issue.3, pp.1-1226, 2009. ,
DOI : 10.1145/1592440.1592441
Concurrent operations in a distributed and mobile collaborative environment, Proceedings 14th International Conference on Data Engineering, pp.36-45, 1998. ,
DOI : 10.1109/ICDE.1998.655755
Team-based access control (tmac): a primitive for applying role-based access controls in collaborative environments, Proceedings of the second ACM workshop on Role-based access control, RBAC '97, pp.13-19, 1997. ,
Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management, Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, pp.166-181, 1998. ,
Eventually consistent, Communications of the ACM, vol.52, issue.1, pp.40-44, 2009. ,
DOI : 10.1145/1435417.1435432
Peer-to-Peer Computing, 2009. ,
Experience with an Object Reputation System for Peer-to-Peer Filesharing (Awarded Best Paper), NSDI, 2006. ,
Logoot-Undo: Distributed Collaborative Editing System on P2P Networks, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1162-1174, 2010. ,
DOI : 10.1109/TPDS.2009.173
URL : https://hal.archives-ouvertes.fr/hal-00450416
Assuring security and privacy for digital library transactions on the Web: client and server security policies, Proceedings of ADL '97 Forum on Research and Technology. Advances in Digital Libraries, pp.140-151, 1997. ,
DOI : 10.1109/ADL.1997.601210
Policy-based access control for weakly consistent replication, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.293-306, 2010. ,
DOI : 10.1145/1755913.1755943
Trust, Contract and Relationship Development, Organization Studies, vol.26, issue.6, pp.813-840, 2005. ,
DOI : 10.1177/0170840605054594
Norm and action : a logical enquiry, 1963. ,
Deontic logic. Mind, pp.1-15, 1951. ,
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.07, pp.843-857, 2004. ,
DOI : 10.1109/TKDE.2004.1318566
Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems, Proceedings of the 2009 Annual Computer Security Bibliography Applications Conference, ACSAC '09, pp.219-228, 2009. ,
Pastwatch: A distributed version control system, IN NSDI, 2006. ,
Formal model and analysis of usage control, p.3221391, 2006. ,
A usage-based authorization framework for collaborative computing systems, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.180-189, 2006. ,
DOI : 10.1145/1133058.1133084
Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM Transactions on Information and System Security, vol.11, issue.1 ,
DOI : 10.1145/1330295.1330298