N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo, Applicability of identity-based cryptography for disruption-tolerant networking, Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking , MobiOpp '07, pp.7-52, 2007.
DOI : 10.1145/1247694.1247705

P. Costa, C. Mascolo, M. Musolesi, and G. Picco, Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.26, issue.5, pp.748-760, 2008.
DOI : 10.1109/JSAC.2008.080602

K. E. Defrawy, J. Solis, and G. Tsudik, Leveraging social contracts for message confidentiality in delay tolerant networks, Proceedings of 33rd IEEE International Computer Software and Applications Conference, pp.271-279, 2009.
DOI : 10.1109/compsac.2009.43

K. Fall, A delay-tolerant network architecture for challenged internets, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, pp.27-33, 2003.
DOI : 10.1145/863955.863960

K. Fall and S. Farrell, DTN: an architectural retrospective, IEEE Journal on Selected Areas in Communications, vol.26, issue.5, pp.828-836, 2005.
DOI : 10.1109/JSAC.2008.080609

E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti, dRBAC: distributed role-based access control for dynamic coalition environments, Proceedings 22nd International Conference on Distributed Computing Systems, pp.411-420, 2002.
DOI : 10.21236/ada440599

Z. Jia, X. Lin, S. H. Tan, L. Li, and Y. Yang, Public key distribution scheme for delay tolerant networks based on two-channel cryptography, Journal of Network and Computer Applications, vol.35, issue.3, pp.905-913, 2012.
DOI : 10.1016/j.jnca.2011.03.009

A. Jøsang, Subjective Logic: A Formalism for Reasoning Under Uncertainty, 2016.
DOI : 10.1007/978-3-319-42337-1

A. Jsang, T. Azderska, and S. Marsh, Trust Transitivity and Conditional Belief Reasoning, Proceedings of the 6th IFIP International Conference on Trust Management IFIP Advances in Information and Communication Technology, p.6883, 2012.
DOI : 10.1007/978-3-642-29852-3_5

A. Jøsang, S. Pope, and S. Marsh, Exploring Different Types of Trust Propagation, Proceedings of the 4th International Conference on Trust Management (iTrust), p.179192, 2006.
DOI : 10.1007/978-1-4615-6245-0

A. Jøsang, The consensus operator for combining beliefs, Artificial Intelligence, vol.141, issue.1-2, pp.1-2, 2002.
DOI : 10.1016/S0004-3702(02)00259-X

A. Jøsang, A LOGIC FOR UNCERTAIN PROBABILITIES, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.5, issue.03, pp.279-311, 2001.
DOI : 10.1080/03081079708945189

A. Jøsang, An Algebra for Assessing Trust in Certification Chains, Proceedings of the Networks and Distributed Systems Security (NDSS99), 1999.

D. Ma and G. Tsudik, Security and Privacy in Emerging wireless networks, IEEE Wireless Communications, pp.12-21, 2010.

B. S. Manoj, H. Baker, and A. , Communication challenges in emergency response, Communications of the ACM, vol.50, issue.3, pp.51-53, 2007.
DOI : 10.1145/1226736.1226765

V. Oleshchuk, A Novel Framework for Security Enforcement in Networks for Disaster and Crisis Management, Proceedings of the International Conference on Information Systems for Crisis Response and Management, pp.1-6

M. Omar, Y. Challa, and A. Bonabdallah, Reliable and fully distributed trust model for mobile ad hoc networks, Computers & Security, vol.28, issue.3-4, pp.3-4, 2009.
DOI : 10.1016/j.cose.2008.11.009

H. S. Pussewalage and V. A. Oleshchuk, A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pp.255-262, 2017.

H. S. Pussewalage and V. A. Oleshchuk, A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp.46-53, 2016.
DOI : 10.1109/CIC.2016.020

A. Seth and S. Keshav, Practical security for disconnected nodes, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)., 2005.
DOI : 10.1109/NPSEC.2005.1532050