M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996.
DOI : 10.1109/SECPRI.1996.502679

M. Blaze, J. Feigenbaum, and . A. Keromytis, The Role of Trust Management in Distributed Systems Security Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS, vol.1603, pp.185-210, 1999.

D. Chadwick, A. Otenko, and E. Ball, Role-based access control with X.509 attribute certificates, IEEE Internet Computing, vol.7, issue.2, pp.62-69, 2003.
DOI : 10.1109/MIC.2003.1189190

P. Chapin, C. Skalka, and X. S. Wang, Authorization in trust management, ACM Computing Surveys, vol.40, issue.3, pp.1-48, 2008.
DOI : 10.1145/1380584.1380587

A. Felkner, Modeling Trust Mangement in Computer Systems, Proc. of the 9th Int. PhD Workshop OWD 2007, pp.65-70, 2007.

A. Felkner, Set-Theoretic Semantics of Role-Based Trust Management, Proc. of the 10th Int. PhD Workshop OWD 2008, Conference Archives PTETiS, pp.567-572, 2008.

D. F. Ferraiolo and D. R. Kuhn, Role-based Access Control, Proc. of the 15th National Computer Security Conference, pp.554-563, 1992.

D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.4562

D. Gorla, M. Hennessy, and V. Sassone, Inferring dynamic credentials for r??le-based trust management, Proceedings of the 8th ACM SIGPLAN symposium on Principles and practice of declarative programming , PPDP '06, pp.213-224, 2006.
DOI : 10.1145/1140335.1140361

D. Harel and B. Rumpe, Modeling Languages: Syntax, Semantics and All That Stuff, Part I: The Basic Stuff, 2000.

N. Li and J. Mitchell, RT: A Role-Based Trust-Management Framework, Proc. of the 3rd DARPA Information Survivability Conference and Exposition, pp.201-212, 2003.

N. Li, J. Mitchell, and W. Winsborough, Design of a Role-Based Trust-Management Framework, Proc. of the IEEE Symposium on Security and Privacy, pp.114-130, 2002.

N. Li, W. Winsborough, and J. Mitchell, Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management, Proc. of the IEEE Symposium on Security and Privacy, pp.123-139, 2003.

N. Li, W. Winsborough, and J. Mitchell, Distributed Credential Chain Discovery in Trust Management, Journal of Computer Security, vol.1, pp.35-86, 2003.
DOI : 10.1145/502001.502005

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.3410

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.50.7649