Designing for usability: key principles and what designers think, Communications of the ACM, vol.28, issue.3, pp.300-311, 1985. ,
DOI : 10.1145/3166.3170
Towards requirements for trust management. Privacy, Security and Trust (PST) 2012, pp.159-160, 2012. ,
Defining a Trust Framework Design Process. Trust, Privacy, and Security in Digital Business, pp.37-47, 2013. ,
TrustFraMM: Meta Description for Trust Frameworks, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp.772-778, 2012. ,
DOI : 10.1109/SocialCom-PASSAT.2012.63
Limited reputation sharing in P2P systems, Proceedings of the 5th ACM conference on Electronic commerce , EC '04, pp.91-101, 2004. ,
DOI : 10.1145/988772.988787
Byzantine robust trust establishment for mobile ad hoc networks, Telecommunication Systems, vol.8, issue.5, pp.189-206, 2007. ,
DOI : 10.1007/s11235-007-9047-z
Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996. ,
DOI : 10.1109/SECPRI.1996.502679
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
A survey of trust in computer science and the Semantic Web, Web Semantics: Science, Services and Agents on the World Wide Web, vol.5, issue.2, pp.58-71, 2007. ,
DOI : 10.1016/j.websem.2007.03.002
Towards an ontology of trust. Trust, Privacy, and Security in Digital Business, pp.175-184, 2005. ,
Towards a Generic Trust Model ??? Comparison of Various Trust Update Algorithms, Proceedings of the Third international conference on Trust Management, pp.177-192, 2005. ,
DOI : 10.1007/11429760_13
Composing Trust Models towards Interoperable Trust Management. Trust Management V, pp.51-66, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00617629
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems, Computer Standards & Interfaces, vol.32, issue.4, pp.185-196, 2010. ,
DOI : 10.1016/j.csi.2010.01.003
Why Johnny Can ' t Encrypt: A Usability Evaluation of PGP 5, Proceedings of the 8th USENIX Security Symposium, 1999. ,
User-centered security. Proceedings of the 1996 workshop on New security paradigms -NSPW '96, pp.27-33, 1996. ,
DOI : 10.1145/304851.304859
Model driven security, ACM Transactions on Software Engineering and Methodology, vol.15, issue.1, pp.39-91, 2006. ,
DOI : 10.1145/1125808.1125810
A Robust Reputation System for P2P and Mobile Ad-hoc Networks, Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, 2004. ,
Final Architectural Reference Model for the IoT http://www.iot-a.eu/public/public-documents/d1.5/view. Last visited 27 th, Annual Security Report, 2013. ,