A. Abdul-rahman and S. Hailes, A distributed trust model, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.48-60, 1997.
DOI : 10.1145/283699.283739

J. Boender, G. Primiero, and F. Raimondi, Minimizing transitive trust threats in software management systems, 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp.191-198
DOI : 10.1109/PST.2015.7232973

P. Sarathi, C. , and S. Karform, Designing Trust Propagation Algorithms based on Simple Multiplicative Strategy for Social Networks, 2nd International Conference on Communication, Computing & Security [ICCCS-2012], pp.534-539, 2012.

C. Peter, C. Chapin, X. Skalka, and . Wang, Authorization in trust management: Features and foundations, ACM Comput. Surv, vol.40, issue.3, 2008.

B. Christianson and W. S. Harbison, Why isn't trust transitive?, Security Protocols, International Workshop Proceedings, volume 1189 of Lecture Notes in Computer Science, pp.171-176, 1996.
DOI : 10.1007/3-540-62494-5_16

S. Clarke, B. Christianson, and H. Xiao, Trust*: Using Local Guarantees to Extend the Reach of Trust, Security Protocols Workshop, pp.171-178, 2009.
DOI : 10.1007/978-3-642-36213-2_21

G. Cvetkovich, The attribution of social trust, Social Trust and the Management of Risk, pp.53-61, 1999.

G. Cvetkovich and R. E. Lofstedt, Social trust and culture in risk management, Social Trust and the Management of Risk, pp.9-21, 1999.

V. Ramanathan, R. Guha, P. Kumar, A. Raghavan, and . Tomkins, Propagation of trust and distrust, Proceedings of the 13th international conference on World Wide Web, pp.403-412, 2004.

M. Jamali and M. Ester, A matrix factorization technique with trust propagation for recommendation in social networks, Proceedings of the fourth ACM conference on Recommender systems, RecSys '10, pp.135-142, 2010.
DOI : 10.1145/1864708.1864736

A. Jøsang, S. Marsh, and S. Pope, Exploring Different Types of Trust Propagation, Trust Management, pp.179-192, 2006.
DOI : 10.1007/11755593_14

A. Jøsang and S. Pope, Semantic Constraints for Trust Transitivity, APCCM, pp.59-68, 2005.

S. Marsh, . Markr, and . Dibben, Trust, Untrust, Distrust and Mistrust ??? An Exploration of the Dark(er) Side, Trust Management, pp.17-33, 2005.
DOI : 10.1007/11429760_2

D. , H. Mcknight, and N. L. Chervany, Trust and Distrust Definitions: One Bite at a Time, Trust in Cyber-societies, Integrating the Human and Artificial Perspectives, pp.27-54, 2000.

D. , H. Mcknight, C. Kacmar, V. Choudhury, and . Whoops, Did I Use the Wrong Concept to Predict E-Commerce Trust? Modeling the Risk-Related Effects of Trust versus Distrust Concepts, 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, p.182, 2003.

G. Primiero and L. Kosolosky, The Semantics of Untrustworthiness, Topoi, vol.20, issue.2, pp.253-266, 2013.
DOI : 10.1007/s11245-013-9227-2

G. Primiero and F. Raimondi, A typed natural deduction calculus to reason about secure trust, 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp.379-382
DOI : 10.1109/PST.2014.6890963

G. Primiero and M. Taddeo, A modal type theory for formalizing trusted communications, Journal of Applied Logic, vol.10, issue.1, pp.92-114, 2012.
DOI : 10.1016/j.jal.2011.12.002

URL : http://dx.doi.org/10.1016/j.jal.2011.12.002

P. Sztompka, Trust: a sociological theory, 1999.

N. Cai, G. Ziegler, and . Lausen, Propagation Models for Trust and Distrust in Social Networks, Information Systems Frontiers, vol.7, issue.4-5, pp.337-358, 2005.