Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003. ,
DOI : 10.1109/POLICY.2003.1206966
URL : https://hal.archives-ouvertes.fr/hal-01483818
Hippocratic Databases, Proceedings of the 28th International Conference on Very Large Data Bases, VLDB 2002, pp.143-154, 2002. ,
DOI : 10.1016/B978-155860869-6/50021-4
The expressive conception of norms, New Studies in Deontic Logic, pp.95-124, 1981. ,
A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security, vol.5, issue.4, pp.492-540, 2002. ,
DOI : 10.1145/581271.581276
Of Laws in General, 1945. ,
Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, pp.603-619, 2008. ,
DOI : 10.1007/s00778-006-0023-0
Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007. ,
DOI : 10.1007/s10207-007-0017-y
Merging requirements from a set of ranked agents. Knowledge-Based Systems, pp.113-126, 2003. ,
Sharepoint -Collaboration Software for the Enterprise ,
Epidemic Algorithms for Replicated Database Maintenance, Proceedings of the Sixth annual ACM Symposium on Principles of Distributed Computing , PODC'87, pp.1-12, 1987. ,
Controlling access in multiuser interfaces, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.37-62, 1998. ,
DOI : 10.1145/274444.274446
The Parting of the Ways: Divergence, Data Management and Collaborative Work, Proceedings of the fourth conference on European Conference on Computer- Supported Cooperative Work, ECSCW'95, pp.215-230, 1995. ,
DOI : 10.1007/978-94-011-0349-7_14
Groupware: some issues and experiences, Communications of the ACM, vol.34, issue.1, pp.39-58, 1991. ,
DOI : 10.1145/99977.99987
A posteriori compliance control, Proceedings of the 12th ACM symposium on Access control models and technologies, SACMAT '07, pp.11-20, 2007. ,
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
Towards a more complete model of role, Proceedings of the third ACM workshop on Role-based access control , RBAC '98, pp.55-62, 1998. ,
DOI : 10.1145/286884.286898
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004. ,
DOI : 10.1145/984334.984339
The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003. ,
DOI : 10.1145/775152.775242
A logical framework for history-based access control and reputation systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008. ,
DOI : 10.3233/JCS-2008-16102
Context sensitivity in role-based access control, ACM SIGOPS Operating Systems Review, vol.36, issue.3, pp.53-66, 2002. ,
DOI : 10.1145/567331.567336
Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978. ,
DOI : 10.1145/359545.359563
Limiting Disclosure in Hippocratic Databases, Proceedings of the Thirtieth international conference on Very large data bases, pp.108-119, 2004. ,
DOI : 10.1016/B978-012088469-8.50013-9
Collaborating with Git. Linux Magazine, 2006. ,
Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, pp.472-484, 2006. ,
DOI : 10.1016/j.comnet.2005.07.011
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.3865
Virtual Time and Global States of Distributed Systems, Proceedings of the International Workshop on Parallel and Distributed Algorithms, pp.215-226, 1989. ,
Formal methods as a link between software code and legal rules, Proceedings 9th International Conference on Software Engineering and Formal Methods, SEFM 2011, pp.3-18, 2011. ,
Liability in software engineering: overview of the LISE approach and illustration on a case study, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, ICSE 2010, pp.135-144, 2010. ,
SAMS: synchronous, asynchronous, multi-synchronous environments, The 7th International Conference on Computer Supported Cooperative Work in Design, pp.80-84, 2002. ,
DOI : 10.1109/CSCWD.2002.1047653
URL : https://hal.archives-ouvertes.fr/inria-00107571
PeerSim: A scalable P2P simulator, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.99-100, 2009. ,
DOI : 10.1109/P2P.2009.5284506
Why the logical hexagon? Logica Universalis, pp.69-107, 2012. ,
A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002. ,
DOI : 10.1109/HICSS.2002.994181
Mercurial: The Definitive Guide. O'Reilly Media, 2009. ,
Flexible update propagation for weakly consistent replication, Proceedings of the sixteenth ACM symposium on Operating systems principles, SOSP '97 WSPC/INSTRUCTION FILE c-ppc A Contract-extended Push-Pull-Clone Model for Multi-Synchronous Collaboration 41, pp.288-301, 2012. ,
DOI : 10.1145/269005.266711
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.832
An Adaptive Causal Ordering Algorithm Suited to Mobile Computing Environments, Journal of Parallel and Distributed Computing, vol.41, issue.2, pp.190-204, 1997. ,
DOI : 10.1006/jpdc.1996.1300
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.9708
A Commutative Replicated Data Type for Cooperative Editing, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.395-403, 2009. ,
DOI : 10.1109/ICDCS.2009.20
URL : https://hal.archives-ouvertes.fr/hal-01248203
Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006. ,
DOI : 10.1145/1151030.1151053
Multi-synchronous Collaborative Semantic Wikis, Proceedings of the 10th International Conference on Web Information Systems Engineering, WISE '09, pp.115-129, 2009. ,
DOI : 10.1007/978-3-642-04409-0_17
URL : https://hal.archives-ouvertes.fr/inria-00432209
Log auditing through model-checking, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.220-234, 2001. ,
DOI : 10.1109/CSFW.2001.930148
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9868
Replicated abstract data types: Building blocks for collaborative applications, Journal of Parallel and Distributed Computing, vol.71, issue.3, pp.354-368, 2011. ,
DOI : 10.1016/j.jpdc.2010.12.006
A communication agreement framework for access/action control, Proceedings 1996 IEEE Symposium on Security and Privacy, p.154, 1996. ,
DOI : 10.1109/SECPRI.1996.502678
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Policies in accountable contracts, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp.5-7, 2002. ,
DOI : 10.1109/POLICY.2002.1011296
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.6451
Trust for resource control: Self-enforcing automatic rational contracts between computers, 2004. ,
The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver, IEEE Transactions on Computers, vol.29, issue.12, pp.291104-1113, 1980. ,
DOI : 10.1109/TC.1980.1675516
A new dimension in access control, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.196-205, 2002. ,
DOI : 10.1145/587078.587106
Achieving convergence, causality preservation, and intention preservation in real-time cooperative editing systems, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.63-108, 1998. ,
DOI : 10.1145/274444.274447
Log Auditing for Trust Assessment in Peer-to-Peer Collaboration, 2011 10th International Symposium on Parallel and Distributed Computing, 2011. ,
DOI : 10.1109/ISPDC.2011.38
URL : https://hal.archives-ouvertes.fr/inria-00636177
A Contract-extended Push-Pull-Clone Model, Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.211-220, 2011. ,
DOI : 10.4108/icst.collaboratecom.2011.247184
URL : https://hal.archives-ouvertes.fr/inria-00636183
Authenticating operation-based history in collaborative systems, Proceedings of the 17th ACM international conference on Supporting group work, GROUP '12, 2012. ,
DOI : 10.1145/2389176.2389197
URL : https://hal.archives-ouvertes.fr/hal-00761045
Logoot-Undo: Distributed Collaborative Editing System on P2P Networks, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1162-1174, 2010. ,
DOI : 10.1109/TPDS.2009.173
URL : https://hal.archives-ouvertes.fr/hal-00450416
Policy-based access control for weakly consistent replication, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.293-306, 2010. ,
DOI : 10.1145/1755913.1755943
Deontic logic. Mind, pp.1-15, 1951. ,
Norm and action : a logical enquiry, 1963. ,
Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM Transactions on Information and System Security, vol.11, issue.1, pp.1-36, 2008. ,
DOI : 10.1145/1330295.1330298