C. Bryce, Message Quality for Ambient System Security, 2008.
DOI : 10.1007/978-3-540-85209-4_35

URL : https://hal.archives-ouvertes.fr/inria-00300400

C. Bryce, N. Dimmock, K. Krukow, J. Seigneur, V. Cahill et al., Towards an Evaluation Methodology for Computational Trust Systems, Lecture Notes in Computer Science, vol.3477, pp.289-304, 2005.
DOI : 10.1007/11429760_20

C. Bryce, C. Razafimahefa, and M. Pawlak, Lana: An Approach to Programming Autonomous Systems, Lecture Notes in Computer Science, vol.2374, pp.281-298, 2002.
DOI : 10.1007/3-540-47993-7_13

P. Couderc and M. Banâtre, Ambient computing applications: an experience with the SPREAD approach, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, p.291, 2003.
DOI : 10.1109/HICSS.2003.1174830

. Douceur, The Sybil Attack, International Workshop on Peer-to-Peer Systems (IPTP- S), 2002.
DOI : 10.1007/3-540-45748-8_24

F. Csi, 12th annual csi/fbi computer crime and security survey, 2007.

D. Gelernter, Generative communication in Linda, ACM Transactions on Programming Languages and Systems, vol.7, issue.1, pp.80-112, 1985.
DOI : 10.1145/2363.2433

J. Gosling, B. Joy, G. Steele, and G. Bracha, The Java Language Specification, Third Edition. The Java Series, 2005.

D. Konstantas, V. Jones, and R. Herzog, Mobihealth -innovative 2.5/3G mobile services and applications for health care, IST Mobile & wireless telecommunications Summit, pp.17-19, 2002.

D. Mckitterick and J. Dowling, State of the art review of mobile payment technology, 2003.

. Metagroup, Spam, viruses, and content compliance: An opportunity to strategically respond to immediate tactical concerns, 2005.

G. C. Necula, Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.106-119, 1997.
DOI : 10.1145/263699.263712

P. Pellegrino, D. Bonino, and F. Corno, Domotic house gateway, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.1915-1920, 2006.
DOI : 10.1145/1141277.1141730

G. P. Picco, A. L. Murphy, and G. Roman, LIME, Proceedings of the 21st international conference on Software engineering, ICSE '99, pp.368-377, 1999.
DOI : 10.1145/302405.302659

J. Poritz, M. Schunter, E. Van-herreweghen, and M. Waidner, Property attestation? scalable and privacy-friendly security assessment of peer computers, IBM Research, 2004.

R. Rivest, A. Shamir, and L. Adleman, On digital signatures and public key cryptosystems, Comm. A.C.M, vol.21, pp.120-126, 1978.

R. Sekar, V. N. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. Duvarney, Modelcarrying code: a practical approach for safe execution of untrusted applications, SOSP, pp.15-28, 2003.

V. Shmatikov and C. L. Talcott, Reputation-based trust management, Journal of Computer Security, vol.13, issue.1, pp.167-190, 2005.
DOI : 10.3233/JCS-2005-13107

C. Trusted and . Group, TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group, 2005.

N. Zannone, A survey on trust management languages [reduced], 2004.