Message Quality for Ambient System Security, 2008. ,
DOI : 10.1007/978-3-540-85209-4_35
URL : https://hal.archives-ouvertes.fr/inria-00300400
Towards an Evaluation Methodology for Computational Trust Systems, Lecture Notes in Computer Science, vol.3477, pp.289-304, 2005. ,
DOI : 10.1007/11429760_20
Lana: An Approach to Programming Autonomous Systems, Lecture Notes in Computer Science, vol.2374, pp.281-298, 2002. ,
DOI : 10.1007/3-540-47993-7_13
Ambient computing applications: an experience with the SPREAD approach, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, p.291, 2003. ,
DOI : 10.1109/HICSS.2003.1174830
The Sybil Attack, International Workshop on Peer-to-Peer Systems (IPTP- S), 2002. ,
DOI : 10.1007/3-540-45748-8_24
12th annual csi/fbi computer crime and security survey, 2007. ,
Generative communication in Linda, ACM Transactions on Programming Languages and Systems, vol.7, issue.1, pp.80-112, 1985. ,
DOI : 10.1145/2363.2433
The Java Language Specification, Third Edition. The Java Series, 2005. ,
Mobihealth -innovative 2.5/3G mobile services and applications for health care, IST Mobile & wireless telecommunications Summit, pp.17-19, 2002. ,
State of the art review of mobile payment technology, 2003. ,
Spam, viruses, and content compliance: An opportunity to strategically respond to immediate tactical concerns, 2005. ,
Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.106-119, 1997. ,
DOI : 10.1145/263699.263712
Domotic house gateway, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.1915-1920, 2006. ,
DOI : 10.1145/1141277.1141730
LIME, Proceedings of the 21st international conference on Software engineering, ICSE '99, pp.368-377, 1999. ,
DOI : 10.1145/302405.302659
Property attestation? scalable and privacy-friendly security assessment of peer computers, IBM Research, 2004. ,
On digital signatures and public key cryptosystems, Comm. A.C.M, vol.21, pp.120-126, 1978. ,
Modelcarrying code: a practical approach for safe execution of untrusted applications, SOSP, pp.15-28, 2003. ,
Reputation-based trust management, Journal of Computer Security, vol.13, issue.1, pp.167-190, 2005. ,
DOI : 10.3233/JCS-2005-13107
TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group, 2005. ,
A survey on trust management languages [reduced], 2004. ,