P. Abate, R. D. Cosmo, R. Treinen, and S. Zacchiroli, Dependency solving: A separate concern in component evolution management, Journal of Systems and Software, vol.85, issue.10, pp.2228-2240, 2012.
DOI : 10.1016/j.jss.2012.02.018

P. Abate, R. Dicosmo, R. Treinen, and S. Zacchiroli, MPM, Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, CBSE '11, pp.179-188, 2011.
DOI : 10.1145/2000229.2000255

URL : https://hal.archives-ouvertes.fr/inria-00626546

D. Le-berre and A. Parrain, On SAT Technologies for Dependency Management and Beyond, Software Product Lines, 12th International Conference Proceedings. Second Volume (Workshops), pp.197-200, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00870846

J. Boender, Formal verification of a theory of packages, ECEASST, vol.48, 2011.

J. Boender, G. Primiero, and F. Raimondi, Minimizing transitive trust threats in software management systems, 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp.191-198, 2015.
DOI : 10.1109/PST.2015.7232973

V. Ramanathan, R. Guha, P. Kumar, A. Raghavan, and . Tomkins, Propagation of trust and distrust, Proceedings of the 13th international conference on World Wide Web, pp.403-412, 2004.

A. Ignatiev, M. Janota, and J. Marques-silva, Towards efficient optimization in package management systems, Proceedings of the 36th International Conference on Software Engineering, ICSE 2014, pp.745-755, 2014.
DOI : 10.1145/2568225.2568306

A. Jøsang and S. Pope, Semantic Constraints for Trust Transitivity, APCCM, pp.59-68, 2005.

F. Mancinelli, J. Boender, R. D. Cosmo, J. Vouillon, B. Durak et al., Managing the Complexity of Large Free and Open Source Package-Based Software Distributions, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06), pp.18-22, 2006.
DOI : 10.1109/ASE.2006.49

URL : https://hal.archives-ouvertes.fr/hal-00149566

S. Marsh, . Markr, and . Dibben, Trust, Untrust, Distrust and Mistrust ??? An Exploration of the Dark(er) Side, Trust Management, pp.17-33, 2005.
DOI : 10.1007/11429760_2

D. , H. Mcknight, and N. L. Chervany, Trust and Distrust Definitions: One Bite at a Time, Trust in Cyber-societies, Integrating the Human and Artificial Perspectives, pp.27-54, 2000.

G. Primiero and F. Raimondi, A typed natural deduction calculus to reason about secure trust, 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp.379-382, 2014.
DOI : 10.1109/PST.2014.6890963

G. Restall, An Introduction to Substructural Logics, Routledge, 2000.
DOI : 10.4324/9780203252642

URL : http://semarch.linguistics.fas.nyu.edu/barker/Current/restall-handbook.pdf

C. Tucker, D. Shuffelton, R. Jhala, and S. Lerner, OPIUM: Optimal Package Install/Uninstall Manager, 29th International Conference on Software Engineering (ICSE'07), pp.178-188, 2007.
DOI : 10.1109/ICSE.2007.59

URL : http://www.ccs.neu.edu/home/lieber/courses/csu670/f09/resources/opium.pdf

N. Cai, G. Ziegler, and . Lausen, Propagation Models for Trust and Distrust in Social Networks, Information Systems Frontiers, vol.7, issue.4-5, pp.337-358, 2005.