D. E. Bell and L. J. Lapadula, Secure computer systems: Mathematical foundations and model, The MITRE Corporation, 1973.

M. Blaze and J. Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The KeyNote Trust-Management System Version, 1999.

M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996.
DOI : 10.1109/SECPRI.1996.502679

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.44.6276

A. Piero, C. Bonatti, D. Duma, N. Olmedilla, and . Shahmehri, An integration of reputation-based and policy-based trust management, Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, 2005.

M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli, Fine Grained Access Control with Trust and Reputation Management for Globus, Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems, pp.1505-1515, 2007.
DOI : 10.1007/978-3-540-76843-2_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.4495

J. Feigenbaum, Overview of the AT&T Labs trust-management project, Security Protocols, pp.45-50, 1998.

D. Gollmann, Why Trust is Bad for Security, Electronic Notes in Theoretical Computer Science, vol.157, issue.3, pp.3-9, 2006.
DOI : 10.1016/j.entcs.2005.09.044

URL : http://doi.org/10.1016/j.entcs.2005.09.044

A. Jøsang, D. Gollmann, and R. Au, A method for access authorisation through delegation networks, Proc. Fourth Australasian Information Security Workshop, pp.165-174, 2006.

K. Krukow, M. Nielsen, and V. Sassone, A logical framework for history-based access control and reputation systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008.
DOI : 10.3233/JCS-2008-16102

A. L. Brian, S. Macchia, M. Lange, R. Lyons, K. T. Martin et al., NET Framework Security, 2002.

B. Lampson, M. Abadi, M. Burrows, and E. Wobber, Authentication in distributed systems: theory and practice, ACM Transactions on Computer Systems, vol.10, issue.4, pp.265-310, 1992.
DOI : 10.1145/138873.138874

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4473

R. S. Sandhu, D. Ferraiolo, and R. Kuhn, The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000.
DOI : 10.1145/344287.344301

S. Sukumaran and E. Blessing, Reputation Based Localized Access Control for Mobile Ad-Hoc Networks, Proceedings of Ad-Hoc, Mobile, and Wireless Networks, pp.197-210, 2006.
DOI : 10.1007/11814764_17

H. Yong, Reputation and Role Based Access Control Model for Multi-domain Environments, 2010 International Symposium on Intelligence Information Processing and Trusted Computing, pp.597-600, 2010.
DOI : 10.1109/IPTC.2010.64

H. Zemanek, Was ist Informatik? Elektronische Rechenanlagen, pp.157-161, 1971.