H. Asghari, M. Van-eeten, A. Arnbak, and N. Van-eijk, Security Economics in the HTTPS Value Chain, Twelfth Workshop on the Economics of Information Security, 2013.
DOI : 10.2139/ssrn.2277806

T. Berners-lee, Web security - " HTTPS Everywhere " harmful, 2015.

B. Beurdouche, K. Bhargavan, A. Delignat-lavaud, C. Fournet, M. Kohlweiss et al., A messy state of the union, 2015 IEEE Symposium on Security and Privacy, pp.535-552, 2015.
DOI : 10.1007/978-3-642-54631-0_38

URL : https://hal.archives-ouvertes.fr/hal-01673714

. Jones, Web Authentication: An API for accessing scoped credentials, 2016.

K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, P. Strub et al., Proving the TLS Handshake Secure (As It Is), International Cryptology Conference, pp.235-255, 2014.
DOI : 10.1007/978-3-662-44381-1_14

URL : https://hal.archives-ouvertes.fr/hal-01102229

K. Bhargavan, A. D. Lavaud, C. Fournet, A. Pironti, and P. Y. Strub, Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, 2014 IEEE Symposium on Security and Privacy, pp.98-113, 2014.
DOI : 10.1109/SP.2014.14

URL : https://hal.archives-ouvertes.fr/hal-01102259

C. Bizer, T. Heath, and T. Berners-lee, Linked Data - The Story So Far, Semantic Services, Interoperability and Web Applications: Emerging Concepts, pp.205-227, 2009.
DOI : 10.4018/jswis.2009081901

R. Cyganiak, D. Wood, and M. Lanthaler, RDF 1.1 concepts and abstract syntax, 2014.

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

URL : https://doi.org/10.1016/0022-0000(84)90070-9

H. Halpin, Social semantics, Social Semantics, pp.187-203, 2013.

A. Medi´cmedi´c and A. Golubovi´cgolubovi´c, Making secure semantic web, Universal Journal of Computer Science and Engineering Technology, vol.1, issue.2, pp.99-104, 2010.

M. Nottingham and M. Thomson, Opportunistic security for HTTP, 2016.
DOI : 10.17487/RFC8164

H. Story, B. Harbulot, I. Jacobi, and M. Jones, FOAF+SSL: Restful authentication for the social web, Proceedings of the First Workshop on Trust and Privacy on the Social and Semantic Web, 2009.

S. Tramp, H. Story, A. Sambra, P. Frischmuth, M. Martin et al., Extending the WebID protocol with access delegation, Proceedings of the Third International Conference on Consuming Linked Data, pp.99-111, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00745355

X. Wang and H. Yu, How to Break MD5 and Other Hash Functions, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.19-35, 2005.
DOI : 10.1007/11426639_2

M. West, Upgrade Insecure Requests, 2015. https://www.w3.org/TR/upgrade- insecure-requests