J. D. Gould and C. Lewis, Designing for usability: key principles and what designers think, Communications of the ACM, vol.28, issue.3, pp.300-311, 1985.
DOI : 10.1145/3166.3170

M. Vinkovits, Towards requirements for trust management. Privacy, Security and Trust (PST) 2012, pp.159-160, 2012.

M. Vinkovits and A. Zimmermann, Defining a Trust Framework Design Process. Trust, Privacy, and Security in Digital Business, pp.37-47, 2013.

M. Vinkovits and A. Zimmermann, TrustFraMM: Meta Description for Trust Frameworks, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp.772-778, 2012.
DOI : 10.1109/SocialCom-PASSAT.2012.63

S. Marti and H. Garcia-molina, Limited reputation sharing in P2P systems, Proceedings of the 5th ACM conference on Electronic commerce , EC '04, pp.91-101, 2004.
DOI : 10.1145/988772.988787

C. Zouridaki, B. L. Mark, and M. Hejmo, Byzantine robust trust establishment for mobile ad hoc networks, Telecommunication Systems, vol.8, issue.5, pp.189-206, 2007.
DOI : 10.1007/s11235-007-9047-z

M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996.
DOI : 10.1109/SECPRI.1996.502679

A. Josang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

D. Artz and Y. Gil, A survey of trust in computer science and the Semantic Web, Web Semantics: Science, Services and Agents on the World Wide Web, vol.5, issue.2, pp.58-71, 2007.
DOI : 10.1016/j.websem.2007.03.002

L. Viljanen, Towards an ontology of trust. Trust, Privacy, and Security in Digital Business, pp.175-184, 2005.

M. Kinateder, E. Baschny, and K. Rothermel, Towards a Generic Trust Model ??? Comparison of Various Trust Update Algorithms, Proceedings of the Third international conference on Trust Management, pp.177-192, 2005.
DOI : 10.1007/11429760_13

R. Saadi, M. A. Rahaman, V. Issarny, and A. Toninelli, Composing Trust Models towards Interoperable Trust Management. Trust Management V, pp.51-66, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00617629

G. Mármol, F. Martínez-pérez, and G. , Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems, Computer Standards & Interfaces, vol.32, issue.4, pp.185-196, 2010.
DOI : 10.1016/j.csi.2010.01.003

A. Whitten and J. D. Tygar, Why Johnny Can ' t Encrypt: A Usability Evaluation of PGP 5, Proceedings of the 8th USENIX Security Symposium, 1999.

M. E. Zurko and R. T. Simon, User-centered security. Proceedings of the 1996 workshop on New security paradigms -NSPW '96, pp.27-33, 1996.
DOI : 10.1145/304851.304859

D. Basin, J. Doser, and T. Lodderstedt, Model driven security, ACM Transactions on Software Engineering and Methodology, vol.15, issue.1, pp.39-91, 2006.
DOI : 10.1145/1125808.1125810

S. Buchegger, L. Boudec, and J. , A Robust Reputation System for P2P and Mobile Ad-hoc Networks, Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, 2004.

-. Iot and . Project, Final Architectural Reference Model for the IoT http://www.iot-a.eu/public/public-documents/d1.5/view. Last visited 27 th, Annual Security Report, 2013.