M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis, The Role of Trust Management in Distributed Systems Security, Secure Internet Programming: Issues in Distributed and Mobile Object Systems, pp.183-210, 1999.
DOI : 10.1007/3-540-48749-2_8

F. Boudrez, Digital signatures and electronic records, Archival Science, vol.7, issue.2, pp.179-193, 2007.
DOI : 10.1007/978-94-015-9375-5

R. Center and . Libraries, Trustworthy repositories audit & certification: Criteria and checklist, 2008.

T. M. Chen and V. Venkataramanan, Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks, IEEE Internet Computing, vol.9, issue.6, pp.35-41, 2005.
DOI : 10.1109/MIC.2005.123

A. P. Dempster, Upper and Lower Probabilities Induced by a Multivalued Mapping, The Annals of Mathematical Statistics, vol.38, issue.2, pp.325-339, 1967.
DOI : 10.1214/aoms/1177698950

H. M. Gladney, Trustworthy 100-year digital objects, ACM Transactions on Information Systems, vol.22, issue.3, pp.406-436, 2004.
DOI : 10.1145/1010614.1010617

H. M. Gladney and R. A. Lorie, Trustworthy 100-year digital objects, ACM Transactions on Information Systems, vol.23, issue.3, pp.299-324, 2005.
DOI : 10.1145/1080343.1080346

T. Grandison and M. Sloman, A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, vol.3, issue.4, 2000.
DOI : 10.1109/COMST.2000.5340804

J. S. Grant and L. L. Davis, Selection and use of content experts for instrument development, Research in Nursing & Health, vol.20, issue.3, pp.269-274, 1997.
DOI : 10.1002/(SICI)1098-240X(199706)20:3<269::AID-NUR9>3.0.CO;2-G

D. Hu, L. Wang, Y. Zhou, Y. Zhou, X. Jiang et al., D-S Evidence Theory Based Digital Image Trustworthiness Evaluation Model, 2009 International Conference on Multimedia Information Networking and Security, p.2009, 2009.
DOI : 10.1109/MINES.2009.154

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003.
DOI : 10.1145/775152.775242

J. Kohlas and P. A. Monney, Theory of evidence ? A survey of its mathematical foundations, applications and computational aspects, ZOR Zeitschrift f???r Operations Research Mathematical Methods of Operations Research, vol.32, issue.1, pp.35-68, 1994.
DOI : 10.1117/12.7973833

M. Lynn, Determination and Quantification Of Content Validity, Nursing Research, vol.35, issue.6, p.382, 1986.
DOI : 10.1097/00006199-198611000-00017

J. Ma, H. Abie, T. Skramstad, and M. Nygård, Development and validation of requirements for evidential value for assessing trustworthiness of digital records over time, Journal of Information, 2011.

E. Rescorla, SSL and TLS: Designing and building secure systems, 2000.

K. Sentz and S. Ferson, Combination of evidence in dempster-shafer theory, 2002.
DOI : 10.2172/800792

G. Shafer, A Mathematical Theory of Evidence, 1976.

Y. L. Sun, Z. Han, W. Yu, and K. Liu, Attacks on Trust Evaluation in Distributed Networks, 2006 40th Annual Conference on Information Sciences and Systems, pp.1461-1466, 2006.
DOI : 10.1109/CISS.2006.286695

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.419.5646

D. Trcek, A formal apparatus for modeling trust in computing environments, Mathematical and Computer Modelling, vol.49, issue.1-2, pp.226-233, 2009.
DOI : 10.1016/j.mcm.2008.05.005

L. A. Zadeh, A Simple View of the Dempster-Shafer Theory of Evidence and its Implication for the Rule of Combination, AI Magazine, vol.7, issue.2, pp.85-90, 1986.
DOI : 10.1142/9789814261302_0033