Dependency solving: A separate concern in component evolution management, Journal of Systems and Software, vol.85, issue.10, pp.2228-2240, 2012. ,
DOI : 10.1016/j.jss.2012.02.018
MPM, Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, CBSE '11, pp.179-188, 2011. ,
DOI : 10.1145/2000229.2000255
URL : https://hal.archives-ouvertes.fr/inria-00626546
On SAT Technologies for Dependency Management and Beyond, Software Product Lines, 12th International Conference Proceedings. Second Volume (Workshops), pp.197-200, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00870846
Formal verification of a theory of packages, ECEASST, vol.48, 2011. ,
Minimizing transitive trust threats in software management systems, 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp.191-198, 2015. ,
DOI : 10.1109/PST.2015.7232973
Propagation of trust and distrust, Proceedings of the 13th international conference on World Wide Web, pp.403-412, 2004. ,
Towards efficient optimization in package management systems, Proceedings of the 36th International Conference on Software Engineering, ICSE 2014, pp.745-755, 2014. ,
DOI : 10.1145/2568225.2568306
Semantic Constraints for Trust Transitivity, APCCM, pp.59-68, 2005. ,
Managing the Complexity of Large Free and Open Source Package-Based Software Distributions, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06), pp.18-22, 2006. ,
DOI : 10.1109/ASE.2006.49
URL : https://hal.archives-ouvertes.fr/hal-00149566
Trust, Untrust, Distrust and Mistrust ??? An Exploration of the Dark(er) Side, Trust Management, pp.17-33, 2005. ,
DOI : 10.1007/11429760_2
Trust and Distrust Definitions: One Bite at a Time, Trust in Cyber-societies, Integrating the Human and Artificial Perspectives, pp.27-54, 2000. ,
A typed natural deduction calculus to reason about secure trust, 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp.379-382, 2014. ,
DOI : 10.1109/PST.2014.6890963
An Introduction to Substructural Logics, Routledge, 2000. ,
DOI : 10.4324/9780203252642
URL : http://semarch.linguistics.fas.nyu.edu/barker/Current/restall-handbook.pdf
OPIUM: Optimal Package Install/Uninstall Manager, 29th International Conference on Software Engineering (ICSE'07), pp.178-188, 2007. ,
DOI : 10.1109/ICSE.2007.59
URL : http://www.ccs.neu.edu/home/lieber/courses/csu670/f09/resources/opium.pdf
Propagation Models for Trust and Distrust in Social Networks, Information Systems Frontiers, vol.7, issue.4-5, pp.337-358, 2005. ,