D. Gambetta, Can We Trust Trust?, Trust: Making and Breaking Cooperative Relations, pp.213-238, 1990.

A. Jøsang, R. Ismail, and C. Boyd, A Survey of Trust and Reputation Systems for Online Service Provision, Decision Support Systems, vol.43, pp.618-644, 2007.

T. Grandison and M. Sloman, A Survey of Trust in Internet Applications, Commun. Surveys Tuts, 2000.

W. H. Winsborough, K. E. Seamons, and V. E. Jones, Automated Trust Negotiation, DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00. Proceedings, vol.1, pp.88-102, 2000.

W. H. Winsborough and N. Li, Towards Practical Automated Trust Negotiation, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp.92-103, 2002.

T. Yu and M. Winslett, A Unified Scheme for Resource Protection in Automated Trust Negotiation, Symposium on Security and Privacy, pp.110-122, 2003.

F. Moyano, Trust Engineering Framework for Software Services, 2015.

M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson et al., Negotiating Trust in the Web, Internet Computing, IEEE, vol.6, issue.6, pp.30-37, 2002.

A. J. Lee, M. Winslett, and K. J. Perano, TrustBuilder2: A Reconfigurable Framework for Trust Negotiation. No. SAND2007-1928C. Sandia National Laboratories (SNL-CA), 2007.

S. Kasem-madani and M. Meier, Security and Privacy Policy Languages: A Survey, Categorization and Gap Identification, 2015.

P. Kumaraguru, A Survey of Privacy Policy Languages, Workshop on Usable IT Security Management (USM 07): Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007.

K. E. Seamons, Requirements for Policy Languages for Trust Negotiation, IEEE Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks, 2002.

B. Parducci and H. Lockart, eXtensible Access Control Markup Language (XACML) 3.0, Committee Specification 01, 2010.

C. A. Ardagna, Primelife Policy Language, W3C Workshop on Access Control Application Scenarios. W3C, 2009.

S. Trabelsi, PPL Engine: A Symmetric Architecture for Privacy Policy Handling, W3C Workshop on Privacy and Data Usage Control, vol.4, 2010.

M. Azraoui, A-PPL: An Accountability Policy Language, Data Privacy Management, Autonomous Spontaneous Security And Security Assurance, pp.319-326, 2015.

J. Iyilade and J. Vassileva, P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage, IEEE Security and Privacy Workshops, 2014.

Y. L. Gall, A. J. Lee, and A. Kapadia, PlexC: A Policy Language for Exposure Control, Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012.

M. Y. Becker and P. Sewell, Cassandra: Distributed Access Control Policies with Tunable Expressiveness, Policies for Distributed Systems and Networks, Proceedings. Fifth IEEE International Workshop on, 2004.

E. Bertino, E. Ferrari, and A. Squicciarini, X-TNL: An XML-based Language for Trust Negotiations, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003.

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, XPref: A Preference Language for P3P, Computer Networks, 2005.

S. Jajodia, P. Samarati, and V. S. Subrahmanian, A Logical Language for Expressing Authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy, 1997.

J. Clark and S. Derose, XML Path Language (XPath) Version 1.0. W3C Recommendation, 1999.

M. Y. Berker, A. Malkis, and L. Bussard, A Framework for Privacy Preferences and Data-Handling Policies, 2009.

P. A. Bonatti, J. L. De-coi, D. Olmedilla, and L. Sauro, A Rule-Based Trust Negotiation System, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.11, 2010.

M. Dell'amico, HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems, Information Security Technical Report, vol.17, pp.81-92, 2013.

, PRML: Privacy Rights Markup Language Specification Version 0, vol.9, 2001.

P. Bonatti and P. Samarati, Regulating Service Access and Information Release on the Web, 7th ACM Conference on Computer and Communications Security, 2000.

A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid, Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers, Proceeding 2000 IEEE Symposium on Security and Privacy, pp.2-14, 2000.

E. Bertino, S. Castano, and E. Ferrari, On Specifying Security Policies for Web Documents with an XML-based Language, Sixth ACM SACMAT, 2001.

M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The KeyNote TrustManagement System Version 2, RFC 2704, 1999.