K. W. Miller and J. Voas, The Metaphysics of Software Trust, IT Professional, vol.11, issue.2, pp.52-55, 2009.
DOI : 10.1109/MITP.2009.41

W. Hasselbring and R. Reussner, Toward Trustworthy Software Systems, Computer, vol.39, issue.4, pp.91-92, 2006.
DOI : 10.1109/MC.2006.142

G. Mohammadi, N. Paulus, S. Bishr, M. Metzger, A. Könnecke et al., Trustworthiness Attributes and Metrics for Engineering Trusted Internet-Based Software Systems, CLOSER 2013. CCIS, pp.19-35, 2014.
DOI : 10.1007/978-3-319-14224-1_2

T. Bandyszak, N. Mohammadi, M. Bishr, A. Goldsteen, M. Moffie et al., Cyber-Physical Systems Design for Runtime Trustworthiness Maintenance Supported by Tools, pp.148-155, 2015.

B. M. Muir, Trust in automation: Part I. Theoretical issues in the study of trust and human intervention in automated systems, Ergonomics, vol.23, issue.11, pp.1905-1922, 1994.
DOI : 10.1080/00140139408964957

S. Zhao, G. Wu, Y. Li, and K. Yu, A Framework for Trustworthy Web Service Management, 2009 Second International Symposium on Electronic Commerce and Security, pp.479-482, 2009.
DOI : 10.1109/ISECS.2009.226

J. Shaikh, M. Fiedler, and D. Collange, Quality of Experience from user and network perspectives, annals of telecommunications - annales des t??l??communications, vol.65, issue.1-2, pp.47-57, 2010.
DOI : 10.1007/s12243-009-0142-x

A. Bouch, N. Bhatti, and A. J. Kuchinsky, Quality is in the eye of the beholder, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '00, pp.297-304, 2000.
DOI : 10.1145/332040.332447

G. Mohammadi, N. Bandyszak, T. Moffie, M. Chen, X. Weyer et al., Maintaining Trustworthiness of Socio-Technical Systems at Run-Time, TrustBus 2014, pp.1-12, 2014.
DOI : 10.1007/978-3-319-09770-1_1

K. Alhamazani, R. Ranjan, K. Mitra, F. Rabhi, P. Prakash-jayaraman et al., An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art, Computing, vol.48, issue.2, pp.357-377, 2015.
DOI : 10.1007/s00607-014-0398-5

H. Elshaafi, J. Mcgibney, and D. Botvich, Trustworthiness monitoring and prediction of composite services, 2012 IEEE Symposium on Computers and Communications (ISCC), pp.580-000587, 2012.
DOI : 10.1109/ISCC.2012.6249359

G. Lenzini, A. Tokmakoff, and J. Muskens, Managing Trustworthiness in Component-based Embedded Systems, Electronic Notes in Theoretical Computer Science, vol.179, pp.143-155, 2007.
DOI : 10.1016/j.entcs.2006.08.038

URL : http://doi.org/10.1016/j.entcs.2006.08.038

T. Yu, Y. Zhang, and K. Lin, Efficient algorithms for Web services selection with end-to-end QoS constraints, ACM Transactions on the Web, vol.1, issue.1, pp.1-26, 2007.
DOI : 10.1145/1232722.1232728

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.333.1520

K. Leichtenstern, N. Bee, E. Andre, U. Berkmuller, and J. Wagner, Physiological Measurement of Trust-Related Behavior in Trust-Neutral and Trust-Critical Situations, IFIP AICT, vol.358, pp.165-172, 2011.
DOI : 10.1007/978-3-642-22200-9_14

S. Balabit and . Blindspotter, balabit.com/network-security/blindspotter 19. ITU: Vocabulary and Effects of Transmission Parameters on Customer Opinion of Transmission Quality, 2006.

T. Huang, K. Chen, P. Huang, and C. Lei, A Generalizable Methodology for Quantifying User Satisfaction, IEICE Transactions on Communications, vol.91, issue.5, pp.1260-1268, 2008.
DOI : 10.1093/ietcom/e91-b.5.1260

A. Vakili and J. Grégoire, QoE management for video conferencing applications, Computer Networks, vol.57, issue.7, pp.1726-1738, 2013.
DOI : 10.1016/j.comnet.2013.03.002

D. Saladino, A. Paganelli, and M. Casoni, A Tool for Multimedia Quality Assessment in NS3: QoE Monitor. Simulation Modelling Practice and Theory 32, pp.30-41, 2013.

J. Klaue, B. Rathke, and A. Wolisz, EvalVid ??? A Framework for Video Transmission and Quality Evaluation, TOOLS 2003, pp.255-272, 2003.
DOI : 10.1007/978-3-540-45232-4_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3918

M. Fiedler, T. Hossfeld, and P. Tran-gia, A generic quantitative relationship between quality of experience and quality of service, IEEE Network, vol.24, issue.2, pp.36-41, 2010.
DOI : 10.1109/MNET.2010.5430142

J. Zhang and N. Ansari, On assuring end-to-end QoE in next generation networks: challenges and a possible solution, IEEE Communications Magazine, vol.49, issue.7, pp.185-192, 2011.
DOI : 10.1109/MCOM.2011.5936172

M. Surridge, B. Nasser, X. Chen, A. Chakravarthy, and P. Melas, Run-Time Risk Management in Adaptive ICT Systems, 2013 International Conference on Availability, Reliability and Security, pp.102-110, 2013.
DOI : 10.1109/ARES.2013.20

M. Kanakakis, S. Van-der-graaf, C. Kalogiros, and W. Vanobberghen, Computing Trust Levels Based on User???s Personality and Observed System Trustworthiness, TRUST 2015, pp.71-87, 2015.
DOI : 10.1007/978-3-319-22846-4_5

C. Kalogiros, M. Kanakakis, S. Van-der-graaf, and W. Vanobberghen, Profit-Maximizing Trustworthiness Level of Composite Systems, HAS 2015, pp.357-368, 2015.
DOI : 10.1007/978-3-319-20376-8_32

M. Bishr, C. Heinz, T. Bandyszak, M. Moffie, A. Goldsteen et al., Trust and Trustworthiness Maintenance -From Architecture to Evaluation, TRUST 2015, pp.319-320, 2015.