R. S. Sandhu and P. Samarati, Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-48, 1994.
DOI : 10.1109/35.312842

T. Issa and P. Kommers, Social networking for web-based communities, International Journal of Web Based Communities, vol.9, issue.1, pp.5-24, 2013.
DOI : 10.1504/IJWBC.2013.051292

S. Mithas, T. Costello, and A. Tafti, Social Networking in the Enterprise, IT Professional, vol.13, issue.4, pp.16-17, 2011.
DOI : 10.1109/MITP.2011.69

D. Koren, Social networking for the police enterprise, 2013.

S. S. Shim, G. Bhalla, and V. Pendyala, Federated identity management, Computer, vol.38, issue.12, pp.120-122, 2005.
DOI : 10.1109/MC.2005.408

N. Damianou, N. Dulay, E. Lupu, and M. Sloman, The Ponder Policy Specification Language, Policies for Distributed Systems and Networks, pp.18-38, 2001.
DOI : 10.1007/3-540-44569-2_2

V. C. Hu, D. R. Kuhn, and D. F. Ferraiolo, Attribute-Based Access Control, Computer, vol.48, issue.2, pp.85-88, 2015.
DOI : 10.1109/MC.2015.33

L. Zhang, G. Ahn, and B. Chu, A role-based delegation framework for healthcare information systems, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.125-134, 2002.
DOI : 10.1145/507711.507731

K. Gaaloul, H. A. Proper, and F. Charoy, Delegation Protocols in Human-Centric Workflows, 2011 IEEE 13th Conference on Commerce and Enterprise Computing, pp.219-224, 2011.
DOI : 10.1109/CEC.2011.38

URL : https://hal.archives-ouvertes.fr/hal-00643449

J. A. Russo and R. Yates, Time limited collaborative community role delegation policy, p.498, 2008.

S. S. Yau, Y. Yao, and A. B. Buduru, An adaptable distributed trust management framework for large-scale secure service-based systems, Computing, vol.4, issue.4, pp.925-949, 2014.
DOI : 10.1007/s00607-013-0354-9

J. Carter, E. Bitting, and A. A. Ghorbani, Reputation Formalization for an Information-Sharing Multi-Agent System, Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, pp.515-534, 2001.
DOI : 10.1111/1467-8640.t01-1-00201

E. T. Mueller, Commonsense reasoning, 2010.

E. Zahoor, O. Perrin, and A. Bouchami, CATT: A Cloud Based Authorization Framework with Trust and Temporal Aspects, Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.285-294, 2014.
DOI : 10.4108/icst.collaboratecom.2014.257312

URL : https://hal.archives-ouvertes.fr/hal-01103043

E. Barka and R. Sandhu, A role-based delegation model and some extensions, 23rd National Information Systems Security Conference. Citeseer, pp.396-404, 2000.

E. Barka and R. Sandhu, Role-Based Delegation Model/ Hierarchical Roles (RBDM1), 20th Annual Computer Security Applications Conference, pp.396-404, 2004.
DOI : 10.1109/CSAC.2004.31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9381

E. Barka and R. S. Sandhu, Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.11-15, 2000.
DOI : 10.1109/ACSAC.2000.898870

L. Zhang, G. Ahn, and B. Chu, A rule-based framework for role-based delegation and revocation, ACM Transactions on Information and System Security, vol.6, issue.3, pp.404-441, 2003.
DOI : 10.1145/937527.937530

Z. Liu, W. Sun, and M. Alam, A flexible role-based delegation model with dynamic delegation role structure

P. Tsankov, S. Marinovic, M. T. Dashti, and D. Basin, Decentralized Composite Access Control, 2014.
DOI : 10.1007/978-3-642-54792-8_14

URL : http://e-collection.ethbib.ethz.ch/show?type=bericht&nr=1010

L. Seitz, E. Rissanen, T. Sandholm, B. S. Firozabadi, and O. Mulmo, Policy administration control and delegation using XACML and Delegent, The 6th IEEE/ACM International Workshop on Grid Computing, 2005., pp.49-54, 2005.
DOI : 10.1109/GRID.2005.1542723

B. S. Firozabadi, M. Sergot, and O. Bandmann, Using Authority Certificates to Create Management Structures, Security Protocols, pp.134-145, 2002.
DOI : 10.1007/3-540-45807-7_21

K. Gaaloul, E. Zahoor, F. Charoy, and C. Godart, Dynamic Authorisation Policies for Event-Based Task Delegation, Advanced Information Systems Engineering, pp.135-149, 2010.
DOI : 10.1007/978-3-642-13094-6_12

URL : https://hal.archives-ouvertes.fr/inria-00466220

A. Jsang and R. Ismail, The beta reputation system, Proceedings of the 15th bled electronic commerce conference, pp.41-55, 2002.

L. Mui, M. Mohtashemi, and A. Halberstadt, A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002.
DOI : 10.1109/HICSS.2002.994181

S. Buchegger and J. Boudec, A robust reputation system for peer-to-peer and mobile ad-hoc networks, 2004.

W. L. Teacy, J. Patel, N. R. Jennings, and M. Luck, TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources, Autonomous Agents and Multi-Agent Systems, vol.19, issue.1, pp.183-198, 2006.
DOI : 10.1007/s10458-006-5952-x

V. Cahill, Using trust for secure collaboration in uncertain environments, IEEE Pervasive Computing, vol.2, issue.3, 2003.
DOI : 10.1109/MPRV.2003.1228527

V. Sassone, K. Krukow, and M. Nielsen, Towards a formal framework for computational trust, " in Formal Methods for Components and Objects, pp.175-184, 2007.

R. A. Kowalski and M. J. Sergot, A logic-based calculus of events, New Generation Comput, vol.4, issue.1, 1986.

A. Abdul-rahman and S. Hailes, Supporting trust in virtual communities, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p.9, 2000.
DOI : 10.1109/HICSS.2000.926814