M. Abdalla and L. Reyzin, A New Forward-Secure Digital Signature Scheme, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT'00), pp.116-129, 2000.
DOI : 10.1007/3-540-44448-3_10

R. Accorsi, Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics, pp.94-110, 2009.
DOI : 10.1109/IMF.2009.18

C. N. Chong, Z. Peng, and P. H. Hartel, Secure Audit Logging with Tamper-Resistant Hardware, Proceedings of the 18th IFIP TC11 International Conference on Information Security, Security and Privacy in the Age of Uncertainty (SEC'03), pp.73-84, 2003.
DOI : 10.1007/978-0-387-35691-4_7

S. A. Crosby and D. S. Wallach, Efficient data structures for tamper-evident logging, 18th USENIX Security Symposium, pp.317-334, 2009.

D. Davis, F. Monrose, and M. K. Reiter, Time-Scoped Searching of Encrypted Audit Logs, Proceedings of the 6th International Conference on Information and Communications Security, pp.532-545, 2004.
DOI : 10.1007/978-3-540-30191-2_41

A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson et al., Epidemic Algorithms for Replicated Database Maintenance, Proceedings of the Sixth annual ACM Symposium on Principles of Distributed Computing (PODC'87), pp.1-12, 1987.

J. R. Douceur, The Sybil Attack, Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS'01), pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

P. Dourish, The Parting of the Ways: Divergence, Data Management and Collaborative Work, Proceedings of the fourth conference on European Conference on Computer-Supported Cooperative Work (ECSCW'95), pp.215-230, 1995.
DOI : 10.1007/978-94-011-0349-7_14

M. T. Goodrich, R. Tamassia, and A. Schwerin, Implementation of an authenticated dictionary with skip lists and commutative hashing, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, pp.68-82, 2001.
DOI : 10.1109/DISCEX.2001.932160

S. Greenberg, Personalizable groupware: Accommodating individual roles and group differences, Proceedings of the second conference on European Conference on Computer-Supported Cooperative Work (ECSCW'91), pp.17-31, 1991.
DOI : 10.1007/978-94-011-3506-1_2

S. Greenberg, M. Roseman, D. Webster, and R. Bohnet, Human and technical factors of distributed group drawing tools, Interacting with Computers, vol.4, issue.3, pp.364-392, 1992.
DOI : 10.1016/0953-5438(92)90023-9

A. Haeberlen, P. Kouznetsov, and P. Druschel, Peerreview: practical accountability for distributed systems, Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP'07), pp.175-188, 2007.

R. Hasan, R. Sion, and M. Winslett, The case of the fake picasso: Preventing history forgery with secure provenance, 7th USENIX Conference on File and Storage Technologies (FAST'09), pp.1-14, 2009.

J. E. Holt, Logcrypt: forward security and public verification for secure audit logs, Proceedings of the 2006 Australasian workshops on Grid computing and e-research, pp.203-211, 2006.

C. Ignat, S. Papadopoulou, G. Oster, and M. C. Norrie, Providing awareness in multi-synchronous collaboration without compromising privacy, Proceedings of the ACM 2008 conference on Computer supported cooperative work, CSCW '08, pp.659-668, 2008.
DOI : 10.1145/1460563.1460665

URL : https://hal.archives-ouvertes.fr/inria-00343817

B. B. Kang, S2D2: A Framework for Scalable and Secure Optimistic Replication, 2004.

B. B. Kang, R. Wilensky, and J. Kubiatowicz, The hash history approach for reconciling mutual inconsistency, Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS'03), pp.670-677, 2003.

A. Kermarrec, A. Rowstron, M. Shapiro, and P. Druschel, The IceCube approach to the reconciliation of divergent replicas, Proceedings of the twentieth annual ACM symposium on Principles of distributed computing , PODC '01, pp.210-218, 2001.
DOI : 10.1145/383962.384020

URL : https://hal.archives-ouvertes.fr/hal-01248215

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978.
DOI : 10.1145/359545.359563

E. Lippe and N. Van-oosterom, Operation-based merging, ACM SIGSOFT Software Engineering Notes, vol.17, issue.5, pp.78-87, 1992.
DOI : 10.1145/142882.143753

J. Loeliger, Collaborating with Git. Linux Magazine, 2006.

D. Ma, Practical forward secure sequential aggregate signatures, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.341-352, 2008.
DOI : 10.1145/1368310.1368361

D. Ma and G. Tsudik, Extended Abstract: Forward-Secure Sequential Aggregate Authentication, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.86-91, 2007.
DOI : 10.1109/SP.2007.18

D. Ma and G. Tsudik, A new approach to secure logging, ACM Transactions on Storage, vol.5, issue.1, pp.1-21, 2009.
DOI : 10.1145/1502777.1502779

P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi et al., Depot, ACM Transactions on Computer Systems, vol.29, issue.4, pp.1-1238, 2011.
DOI : 10.1145/2063509.2063512

P. Maniatis and M. Baker, Secure history preservation through timeline entanglement, Proceedings of the 11th USENIX Security Symposium, pp.297-312, 2002.

P. Maniatis and M. Baker, Authenticated append-only skip lists, Acta Mathematica, vol.137, pp.151-169, 2003.

G. Mella, E. Ferrari, E. Bertino, and Y. Koglin, Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems, ACM Transactions on Information and System Security, vol.9, issue.4, pp.421-460, 2006.
DOI : 10.1145/1187441.1187443

R. C. Merkle, Secrecy, authentication, and public key systems, p.8001972, 1979.

B. O. Sullivan, Mercurial: The Definitive Guide. O'Reilly Media, 2009.

C. Papamanthou, R. Tamassia, and N. Triandopoulos, Authenticated hash tables, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.437-448, 2008.
DOI : 10.1145/1455770.1455826

K. Petersen, M. J. Spreitzer, D. B. Terry, M. M. Theimer, and A. J. Demers, Flexible update propagation for weakly consistent replication, Proceedings of the sixteenth ACM symposium on Operating systems principles (SOSP'97), pp.288-301, 1997.

Z. N. Peterson, R. Burns, G. Ateniese, and S. Bono, Design and implementation of verifiable audit trails for a versioning file system, Proceedings of the 5th USENIX conference on File and Storage Technologies, pp.20-20, 2007.

N. M. Preguiça, J. M. Marquès, M. Shapiro, and M. Letia, A Commutative Replicated Data Type for Cooperative Editing, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.395-403, 2009.
DOI : 10.1109/ICDCS.2009.20

Y. Saito and M. Shapiro, Optimistic replication, ACM Computing Surveys, vol.37, issue.1, pp.42-81, 2005.
DOI : 10.1145/1057977.1057980

URL : https://hal.archives-ouvertes.fr/inria-00444768

M. Satyanarayanan, J. J. Kistler, P. Kumar, M. E. Okasaki, E. H. Siegel et al., Coda: a highly available file system for a distributed workstation environment, IEEE Transactions on Computers, vol.39, issue.4, pp.447-459, 1990.
DOI : 10.1109/12.54838

B. Schneier and J. Kelsey, Cryptographic support for secure logs on untrusted machines, Proceedings of the 7th conference on USENIX Security Symposium, pp.4-4, 1998.

M. J. Spreitzer, M. M. Theimer, K. Petersen, A. J. Demers, and D. B. Terry, Dealing with server corruption in weakly consistent, replicated data systems, Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking , MobiCom '97, pp.234-240, 1997.
DOI : 10.1145/262116.262151

K. Walsh and E. G. Sirer, Experience with an Object Reputation System for Peer-to-Peer Filesharing (Awarded Best Paper), Proceedings of the 3rd conference on Networked Systems Design & Implementation, 2006.

S. Weiss, P. Urso, and P. Molli, Logoot-Undo: Distributed Collaborative Editing System on P2P Networks, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1162-1174, 2010.
DOI : 10.1109/TPDS.2009.173

URL : https://hal.archives-ouvertes.fr/hal-00450416

A. A. Yavuz and P. Ning, BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems, 2009 Annual Computer Security Applications Conference, pp.219-228, 2009.
DOI : 10.1109/ACSAC.2009.28