A. Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, Proceedings of the 28th International Conference on Very Large Data Bases, VLDB 2002, pp.143-154, 2002.
DOI : 10.1016/B978-155860869-6/50021-4

C. E. Alchourron and E. Bulygin, The expressive conception of norms, New Studies in Deontic Logic, pp.95-124, 1981.

J. Bacon, K. Moody, and W. Yao, A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security, vol.5, issue.4, pp.492-540, 2002.
DOI : 10.1145/581271.581276

J. Bentham and H. L. Hart, Of Laws in General, 1945.

J. Byun and N. Li, Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, pp.603-619, 2008.
DOI : 10.1007/s00778-006-0023-0

J. G. Cederquist, R. Corin, M. A. Dekker, S. Etalle, J. I. Hartog et al., Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007.
DOI : 10.1007/s10207-007-0017-y

L. Cholvya and A. Hunterb, Merging requirements from a set of ranked agents. Knowledge-Based Systems, pp.113-126, 2003.

M. Cooperation, Sharepoint -Collaboration Software for the Enterprise

A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson et al., Epidemic Algorithms for Replicated Database Maintenance, Proceedings of the Sixth annual ACM Symposium on Principles of Distributed Computing , PODC'87, pp.1-12, 1987.

P. Dewan and H. Shen, Controlling access in multiuser interfaces, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.37-62, 1998.
DOI : 10.1145/274444.274446

P. Dourish, The Parting of the Ways: Divergence, Data Management and Collaborative Work, Proceedings of the fourth conference on European Conference on Computer- Supported Cooperative Work, ECSCW'95, pp.215-230, 1995.
DOI : 10.1007/978-94-011-0349-7_14

C. A. Ellis, S. J. Gibbs, and G. Rein, Groupware: some issues and experiences, Communications of the ACM, vol.34, issue.1, pp.39-58, 1991.
DOI : 10.1145/99977.99987

S. Etalle and W. H. Winsborough, A posteriori compliance control, Proceedings of the 12th ACM symposium on Access control models and technologies, SACMAT '07, pp.11-20, 2007.

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

C. Goh and A. Baldwin, Towards a more complete model of role, Proceedings of the third ACM workshop on Role-based access control , RBAC '98, pp.55-62, 1998.
DOI : 10.1145/286884.286898

J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003.
DOI : 10.1145/775152.775242

K. Krukow, M. Nielsen, and V. Sassone, A logical framework for history-based access control and reputation systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008.
DOI : 10.3233/JCS-2008-16102

A. Kumar, N. Karnik, and G. Chafle, Context sensitivity in role-based access control, ACM SIGOPS Operating Systems Review, vol.36, issue.3, pp.53-66, 2002.
DOI : 10.1145/567331.567336

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978.
DOI : 10.1145/359545.359563

K. Lefevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu et al., Limiting Disclosure in Hippocratic Databases, Proceedings of the Thirtieth international conference on Very large data bases, pp.108-119, 2004.
DOI : 10.1016/B978-012088469-8.50013-9

J. Loeliger, Collaborating with Git. Linux Magazine, 2006.

S. Marti and H. Garcia-molina, Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, pp.472-484, 2006.
DOI : 10.1016/j.comnet.2005.07.011

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. Mattern, Virtual Time and Global States of Distributed Systems, Proceedings of the International Workshop on Parallel and Distributed Algorithms, pp.215-226, 1989.

D. L. Métayer, Formal methods as a link between software code and legal rules, Proceedings 9th International Conference on Software Engineering and Formal Methods, SEFM 2011, pp.3-18, 2011.

D. L. Métayer, M. Maarek, V. V. Tong, E. Mazza, M. Potet et al., Liability in software engineering: overview of the LISE approach and illustration on a case study, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, ICSE 2010, pp.135-144, 2010.

P. Molli, H. Skaf-molli, G. Oster, and S. Jourdain, SAMS: synchronous, asynchronous, multi-synchronous environments, The 7th International Conference on Computer Supported Cooperative Work in Design, pp.80-84, 2002.
DOI : 10.1109/CSCWD.2002.1047653

URL : https://hal.archives-ouvertes.fr/inria-00107571

A. Montresor and M. Jelasity, PeerSim: A scalable P2P simulator, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.99-100, 2009.
DOI : 10.1109/P2P.2009.5284506

A. Moretti, Why the logical hexagon? Logica Universalis, pp.69-107, 2012.

L. Mui, M. Mohtashemi, and A. Halberstadt, A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002.
DOI : 10.1109/HICSS.2002.994181

B. O. Sullivan, Mercurial: The Definitive Guide. O'Reilly Media, 2009.

K. Petersen, M. J. Spreitzer, D. B. Terry, M. M. Theimer, and A. J. Demers, Flexible update propagation for weakly consistent replication, Proceedings of the sixteenth ACM symposium on Operating systems principles, SOSP '97 WSPC/INSTRUCTION FILE c-ppc A Contract-extended Push-Pull-Clone Model for Multi-Synchronous Collaboration 41, pp.288-301, 2012.
DOI : 10.1145/269005.266711

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Prakash, M. Raynal, and M. Singhal, An Adaptive Causal Ordering Algorithm Suited to Mobile Computing Environments, Journal of Parallel and Distributed Computing, vol.41, issue.2, pp.190-204, 1997.
DOI : 10.1006/jpdc.1996.1300

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

N. Preguica, J. M. Marques, M. Shapiro, and M. Letia, A Commutative Replicated Data Type for Cooperative Editing, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.395-403, 2009.
DOI : 10.1109/ICDCS.2009.20

URL : https://hal.archives-ouvertes.fr/hal-01248203

A. Pretschner, M. Hilty, and D. Basin, Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006.
DOI : 10.1145/1151030.1151053

C. Rahhal, H. Skaf-molli, P. Molli, and S. Weiss, Multi-synchronous Collaborative Semantic Wikis, Proceedings of the 10th International Conference on Web Information Systems Engineering, WISE '09, pp.115-129, 2009.
DOI : 10.1007/978-3-642-04409-0_17

URL : https://hal.archives-ouvertes.fr/inria-00432209

M. Roger and J. Goubault-larrecq, Log auditing through model-checking, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.220-234, 2001.
DOI : 10.1109/CSFW.2001.930148

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. Roh, M. Jeon, J. Kim, and J. Lee, Replicated abstract data types: Building blocks for collaborative applications, Journal of Parallel and Distributed Computing, vol.71, issue.3, pp.354-368, 2011.
DOI : 10.1016/j.jpdc.2010.12.006

M. Roscheisen and T. Winograd, A communication agreement framework for access/action control, Proceedings 1996 IEEE Symposium on Security and Privacy, p.154, 1996.
DOI : 10.1109/SECPRI.1996.502678

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

B. Shand and J. Bacon, Policies in accountable contracts, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp.5-7, 2002.
DOI : 10.1109/POLICY.2002.1011296

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. N. Shand, Trust for resource control: Self-enforcing automatic rational contracts between computers, 2004.

R. G. Smith, The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver, IEEE Transactions on Computers, vol.29, issue.12, pp.291104-1113, 1980.
DOI : 10.1109/TC.1980.1675516

G. Stevens and V. Wulf, A new dimension in access control, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.196-205, 2002.
DOI : 10.1145/587078.587106

C. Sun, X. Jia, Y. Zhang, Y. Yang, and D. Chen, Achieving convergence, causality preservation, and intention preservation in real-time cooperative editing systems, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.63-108, 1998.
DOI : 10.1145/274444.274447

H. T. Truong and C. Ignat, Log Auditing for Trust Assessment in Peer-to-Peer Collaboration, 2011 10th International Symposium on Parallel and Distributed Computing, 2011.
DOI : 10.1109/ISPDC.2011.38

URL : https://hal.archives-ouvertes.fr/inria-00636177

H. T. Truong, C. Ignat, M. Bouguelia, and P. Molli, A Contract-extended Push-Pull-Clone Model, Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.211-220, 2011.
DOI : 10.4108/icst.collaboratecom.2011.247184

URL : https://hal.archives-ouvertes.fr/inria-00636183

H. T. Truong, C. Ignat, and P. Molli, Authenticating operation-based history in collaborative systems, Proceedings of the 17th ACM international conference on Supporting group work, GROUP '12, 2012.
DOI : 10.1145/2389176.2389197

URL : https://hal.archives-ouvertes.fr/hal-00761045

S. Weiss, P. Urso, and P. Molli, Logoot-Undo: Distributed Collaborative Editing System on P2P Networks, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1162-1174, 2010.
DOI : 10.1109/TPDS.2009.173

URL : https://hal.archives-ouvertes.fr/hal-00450416

T. Wobber, T. L. Rodeheffer, and D. B. Terry, Policy-based access control for weakly consistent replication, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.293-306, 2010.
DOI : 10.1145/1755913.1755943

G. H. Wright, Deontic logic. Mind, pp.1-15, 1951.

G. H. Wright, Norm and action : a logical enquiry, 1963.

X. Zhang, M. Nakae, M. J. Covington, and R. S. Sandhu, Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM Transactions on Information and System Security, vol.11, issue.1, pp.1-36, 2008.
DOI : 10.1145/1330295.1330298