Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-48, 1994. ,
DOI : 10.1109/35.312842
Social networking for web-based communities, International Journal of Web Based Communities, vol.9, issue.1, pp.5-24, 2013. ,
DOI : 10.1504/IJWBC.2013.051292
Social Networking in the Enterprise, IT Professional, vol.13, issue.4, pp.16-17, 2011. ,
DOI : 10.1109/MITP.2011.69
Social networking for the police enterprise, 2013. ,
Federated identity management, Computer, vol.38, issue.12, pp.120-122, 2005. ,
DOI : 10.1109/MC.2005.408
The Ponder Policy Specification Language, Policies for Distributed Systems and Networks, pp.18-38, 2001. ,
DOI : 10.1007/3-540-44569-2_2
Attribute-Based Access Control, Computer, vol.48, issue.2, pp.85-88, 2015. ,
DOI : 10.1109/MC.2015.33
A role-based delegation framework for healthcare information systems, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.125-134, 2002. ,
DOI : 10.1145/507711.507731
Delegation Protocols in Human-Centric Workflows, 2011 IEEE 13th Conference on Commerce and Enterprise Computing, pp.219-224, 2011. ,
DOI : 10.1109/CEC.2011.38
URL : https://hal.archives-ouvertes.fr/hal-00643449
Time limited collaborative community role delegation policy, p.498, 2008. ,
An adaptable distributed trust management framework for large-scale secure service-based systems, Computing, vol.4, issue.4, pp.925-949, 2014. ,
DOI : 10.1007/s00607-013-0354-9
Reputation Formalization for an Information-Sharing Multi-Agent System, Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, pp.515-534, 2001. ,
DOI : 10.1111/1467-8640.t01-1-00201
Commonsense reasoning, 2010. ,
CATT: A Cloud Based Authorization Framework with Trust and Temporal Aspects, Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.285-294, 2014. ,
DOI : 10.4108/icst.collaboratecom.2014.257312
URL : https://hal.archives-ouvertes.fr/hal-01103043
A role-based delegation model and some extensions, 23rd National Information Systems Security Conference. Citeseer, pp.396-404, 2000. ,
Role-Based Delegation Model/ Hierarchical Roles (RBDM1), 20th Annual Computer Security Applications Conference, pp.396-404, 2004. ,
DOI : 10.1109/CSAC.2004.31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9381
Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.11-15, 2000. ,
DOI : 10.1109/ACSAC.2000.898870
A rule-based framework for role-based delegation and revocation, ACM Transactions on Information and System Security, vol.6, issue.3, pp.404-441, 2003. ,
DOI : 10.1145/937527.937530
A flexible role-based delegation model with dynamic delegation role structure ,
Decentralized Composite Access Control, 2014. ,
DOI : 10.1007/978-3-642-54792-8_14
URL : http://e-collection.ethbib.ethz.ch/show?type=bericht&nr=1010
Policy administration control and delegation using XACML and Delegent, The 6th IEEE/ACM International Workshop on Grid Computing, 2005., pp.49-54, 2005. ,
DOI : 10.1109/GRID.2005.1542723
Using Authority Certificates to Create Management Structures, Security Protocols, pp.134-145, 2002. ,
DOI : 10.1007/3-540-45807-7_21
Dynamic Authorisation Policies for Event-Based Task Delegation, Advanced Information Systems Engineering, pp.135-149, 2010. ,
DOI : 10.1007/978-3-642-13094-6_12
URL : https://hal.archives-ouvertes.fr/inria-00466220
The beta reputation system, Proceedings of the 15th bled electronic commerce conference, pp.41-55, 2002. ,
A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002. ,
DOI : 10.1109/HICSS.2002.994181
A robust reputation system for peer-to-peer and mobile ad-hoc networks, 2004. ,
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources, Autonomous Agents and Multi-Agent Systems, vol.19, issue.1, pp.183-198, 2006. ,
DOI : 10.1007/s10458-006-5952-x
Using trust for secure collaboration in uncertain environments, IEEE Pervasive Computing, vol.2, issue.3, 2003. ,
DOI : 10.1109/MPRV.2003.1228527
Towards a formal framework for computational trust, " in Formal Methods for Components and Objects, pp.175-184, 2007. ,
A logic-based calculus of events, New Generation Comput, vol.4, issue.1, 1986. ,
Supporting trust in virtual communities, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p.9, 2000. ,
DOI : 10.1109/HICSS.2000.926814