R. Cooke, Experts in Uncertainty: Opinion and Subjective Probability in Science, 1991.

L. Goossens, F. Harper, B. Kraan, and H. Meacutetivier, Expert Judgement for a Probabilistic Accident Consequence Uncertainty Analysis, Radiation Protection Dosimetry, vol.90, issue.3, pp.295-303, 2000.
DOI : 10.1093/oxfordjournals.rpd.a033151

E. Project and E. , 27046-ACTIVE: EP-27046-ACTIVE, Final Prototype and User Manual, D4.2.2, Ver, 2001.

M. E. Østvang, The Honeynet Project, Phase 1: Installing and Tuning Honeyd using LIDS (2003) Project assignment

D. Karig and R. Lee, Remote Denial of Service Attacks and Countermeasures, 2001.

A. Barkley, S. Liu, Q. Gia, M. Dingfield, and Y. Gokhale, A Testbed for Study of Distributed Denial of Service Attacks, Proceedings of the IEEE Workshop on Information Assurance and Security, pp.218-223, 2000.

S. Lin and T. Chiueh, A Survey on Solutions to Distributed Denial of Service Attacks, 2006.

A. Jøsang, A subjective metric of authentication, Proceedings of the 5th European Symposium on Research in Computer Security, pp.329-344, 1998.
DOI : 10.1007/BFb0055873

A. Jøsang, An Algebra for Assessing Trust in Certification Chains, Proceedings of the 1999 Network and Distributed Systems Security Symposium, 1999.

M. Cohen, R. Parasuraman, and J. Freeman, Trust in Decision Aids: A Model and a Training Strategy, 1997.

R. Yahalom, B. Klein, and T. Beth, Trust relationships in secure systems-a distributed authentication perspective, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp.150-164, 1993.
DOI : 10.1109/RISP.1993.287635

R. Yahalom, B. Klein, and T. Beth, Trust-based Navigation in Distributed Systems, Computing Systems, vol.7, issue.1, pp.45-73, 1994.

T. Beth, M. Borcherding, and B. Klein, Valuation of trust in open networks, Proceedings of the 3rd European Symposium on Research in Computer Security, pp.3-18, 1994.
DOI : 10.1007/3-540-58618-0_53

L. Xiong and L. Liu, A Reputation-Based Trust Model For Peer-To-Peer Ecommerce Communities, Proceedings of the IEEE Conference on E-Commerce, pp.275-284, 2003.

M. Bacharach and D. Gambetta, Trust as Type Identification. In: Trust and Deception in Virtual Societies, pp.1-26, 2000.

S. Purser, A Simple Graphical Tool For Modelling Trust, Computers & Security, vol.20, issue.6, pp.479-484, 2001.
DOI : 10.1016/S0167-4048(01)00605-8

I. Ray and S. Chakraborty, A Vector Model of Trust for Developing Trustworthy Systems, Proceedings of the 9th European Symposium on Research in Computer Security, pp.260-275, 2004.
DOI : 10.1007/978-3-540-30108-0_16

I. Ray, I. Ray, and S. Chakraborty, An interoperable context sensitive model of trust, Journal of Intelligent Information Systems, vol.7, issue.1, pp.75-104, 2009.
DOI : 10.1007/s10844-007-0049-9

A. Abdul-rahman and S. Hailes, Supporting trust in virtual communities, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, pp.4-7, 2000.
DOI : 10.1109/HICSS.2000.926814

M. Burrows, M. Abadi, and R. Needham, A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990.
DOI : 10.1145/77648.77649

A. Jones and B. Firozabadi, On the Characterization of a Trusting Agent ? Aspects of a Formal Approach In: Trust and Deception in Virtual Societies, pp.157-168, 2000.

S. Jajodia, P. Samarati, and V. Subrahmanian, A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.31-42, 1997.
DOI : 10.1109/SECPRI.1997.601312

B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page et al., Towards Operational Measures of Computer Security, Journal of Computer Security, vol.2, issue.2-3, pp.211-229, 1993.
DOI : 10.3233/JCS-1993-22-308

R. Ortalo and Y. Deswarte, Experiments with Quantitative Evaluation Tools for Monitoring Operational Security, IEEE Transaction on Software Engineering, vol.5, issue.25, pp.633-650, 1999.

B. Madan, K. G. Popstojanova, K. Vaidyanathan, and K. Trivedi, Modeling and quantification of security attributes of software systems, Proceedings International Conference on Dependable Systems and Networks, pp.505-514, 2002.
DOI : 10.1109/DSN.2002.1028941

E. Jonsson and T. Olovsson, A quantitative model of the security intrusion process based on attacker behavior, IEEE Transactions on Software Engineering, vol.23, issue.4, pp.235-246, 1997.
DOI : 10.1109/32.588541

C. Alberts, S. Behrens, R. Pethia, and W. Wilson, Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, Version 1.0, 1999.

B. Barber and J. Davey, The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems, Proceedings of the International Medical Informatics Conference, pp.1589-1593, 1992.

S. Houmb, I. Ray, and I. Ray, Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation, Proceedings of the 4th International Conference on Trust Management, pp.135-149, 2006.
DOI : 10.1007/11755593_11