. Rep_f-eedback-[-e-i, Dif f ] which gives the difference (Diff) between the new and old trust relation of

. High_rep_f, Rep[E k ]] which is used to inform the Enabler A about any modification affecting the reputation of its trusted Enablers

?. Co, State == success) then 09 ?-cTE i [co] = cTE i [co] + [? × (1 ? cTE i, pp.7-08

?. Ej, 15 ?BEGIN 16 ?-Old = eTE i [Ej]; -If (State == success) then 18 ?-BEGIN 19 ??eTE i [Ej] = eTE i, ? eTE i [Ej]) × Rec(Ej, co) × W (Con

?. Ej, ?If (State == success) then 31 ??BEGIN 32 ??Dif f = ? × (1 ? R[Ej]) × Rec(Ej, co) × W (Con, co) 33 ??Send (Co_F eedback[Con, co, State = success]) to Ej ??Send (Co_F eedback[Con, co, State = f ail]) to Ej, H2(Ej) and H3, pp.36-37

A. Lomuscio, H. Qu, and M. Solanki, Towards verifying compliance in agent-based web service compositions, Proceedings of The Seventh International Joint Conference on Autonomous Agents and Multi-agent systems (AAMAS-08), pp.265-272, 2008.

A. Abdul-rahman and S. Hailes, A distributed trust model, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.48-60, 1997.
DOI : 10.1145/283699.283739

R. Adaikkalavan and S. Chakravarthy, Event Specification and Processing for Advanced Applications: Generalization and Formalization, Lecture Notes in Computer Science, vol.4653, pp.369-379, 2007.
DOI : 10.1007/978-3-540-74469-6_37

M. A. Marsan, G. Balbo, and G. Conte, A class of generalized stochastic Petri nets for the performance evaluation of multiprocessor systems, ACM Transactions on Computer Systems, vol.2, issue.2, pp.93-122, 1984.
DOI : 10.1145/190.191

A. Marsan and G. Chiola, On Petri nets with deterministic and exponentially distributed firing times Advances in Petri Nets, LNCS, vol.266, pp.132-145, 1987.

C. Alberts, S. Behrens, R. Pethia, and W. Wilson, Operationally critical threat, asset, and vulnerability evaluation framework, version 1.0, 1999.

R. Alur, T. A. Henzinger, and O. Kupferman, Alternating-time temporal logic, Journal of the ACM, vol.49, issue.5, pp.672-713, 2002.
DOI : 10.1145/585265.585270

R. Aringhieri, E. Damiani, S. D. Di-vimercati, S. Paraboschi, and P. Samarati, Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems, Journal of the American Society for Information Science and Technology, vol.18, issue.4, pp.528-537, 2006.
DOI : 10.1002/asi.20307

A. Avi?ienis, Design of fault-tolerant computers, Proceedings of the November 14-16, 1967, fall joint computer conference on, AFIPS '67 (Fall), pp.733-743, 1967.
DOI : 10.1145/1465611.1465708

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

. Axelrod, Complexity of Co-operation: agent based models of competition and collaboration, 1997.

I. Bahar, E. Frohm, C. Gaona, G. Hachtel, E. Macii et al., Algebraic decision diagrams and their applications, Proceedings of 1993 International Conference on Computer Aided Design (ICCAD), pp.188-191171, 1993.
DOI : 10.1109/ICCAD.1993.580054

C. Baier, B. Haverkort, H. Hermanns, and J. Katoen, On the Logical Characterisation of Performability Properties, Proc. 27th International Colloquium on Automata, Languages and Programming, pp.780-792
DOI : 10.1007/3-540-45022-X_65

C. Baier, B. Haverkort, H. Hermanns, and J. Katoen, Model-checking algorithms for continuous-time markov chains, IEEE Transactions on Software Engineering, vol.29, issue.6, pp.524-541, 2003.
DOI : 10.1109/TSE.2003.1205180

G. Balbo, Introduction to Stochastic Petri Nets, Lecture Notes in Computer Science, vol.2090, pp.84-155, 2000.
DOI : 10.1007/3-540-44667-2_3

L. Baresi, C. Ghezzi, and S. Guinea, Smart monitors for composed services, Proceedings of the 2nd international conference on Service oriented computing , ICSOC '04, pp.193-202, 2004.
DOI : 10.1145/1035167.1035195

J. Barnat, L. Brim, I. Cerna, M. Ceska, and J. Tumova, ProbDiVinE-MC: Multi-core LTL Model Checker for Probabilistic Systems, 2008 Fifth International Conference on Quantitative Evaluation of Systems, pp.77-78, 2008.
DOI : 10.1109/QEST.2008.29

A. I. Batavia and G. S. Hammer, Toward the development of consumer-based criteria for the evaluation of assistive devices, The Journal of Rehabilitation Research and Development, vol.27, issue.4, pp.425-436, 1990.
DOI : 10.1682/JRRD.1990.10.0425

A. Bertolino, G. D. Angelis, A. Sabetta, and S. G. Elbaum, Scaling up SLA monitoring in pervasive environments, International workshop on Engineering of software services for pervasive environments in conjunction with the 6th ESEC/FSE joint meeting, ESSPE '07, pp.65-68, 2007.
DOI : 10.1145/1294904.1294914

D. Besnard and B. Arief, Computer security impaired by legitimate users, Computers & Security, vol.23, issue.3, pp.253-264, 2004.
DOI : 10.1016/j.cose.2003.09.002

URL : https://hal.archives-ouvertes.fr/hal-00691818

C. Blundell, D. Giannakopoulou, and C. S. , Assume-guarantee testing, Proceedings of the 2005 conference on Specification and verification of component-based systems, 2005.

A. Bobbio, A. Puliafito, M. Telek, and K. S. Trivedi, RECENT DEVELOPMENTS IN NON-MARKOVIAN STOCHASTIC PETRI NETS, Journal of Circuits, Systems and Computers, vol.08, issue.01, pp.119-158, 1998.
DOI : 10.1142/S0218126698000067

A. Bobbio and M. Telek, Non-exponential stochastic Petri nets: an overview of methods and techniques, Computer Systems Science and Engineering, vol.13, issue.6, pp.339-351, 1998.

K. Boehner, J. Vertesi, P. Sengers, and P. Dourish, How HCI interprets the probes, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, 2007.
DOI : 10.1145/1240624.1240789

A. Bondavalli, S. Chiaradonna, and F. D. Giandomenico, Model-based evaluation as a support to the design of dependable systems, Dependable Computing Systems: Paradigms, Performance Issues, and Applications, pp.57-86, 2005.

E. Borgia, M. Conti, F. Delmastro, and L. Pelusi, Lessons from an ad hoc network test-bed: Middleware and routing issues, Ad Hoc & Sensor Wireless Networks, vol.1, issue.12, 2005.

B. Cabral, P. Marques, and L. Silva, Rail: code instrumentation for .net, Proceedings of the 2005 ACM symposium on Applied computing, pp.1282-1287, 2005.

S. Callanan, D. Dean, M. Gorbovitski, R. Grosu, J. Seyster et al., Software monitoring with bounded overhead, 2008 IEEE International Symposium on Parallel and Distributed Processing, pp.1-8, 2008.
DOI : 10.1109/IPDPS.2008.4536433

J. Carroll, S. Howard, F. Vetere, J. Peck, and J. Murphy, Just what do the youth of today want? Technology appropriation by young people, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002.
DOI : 10.1109/HICSS.2002.994089

A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, Enhancing Java ME Security Support with Resource Usage Monitoring, ICICS, pp.256-266, 2008.
DOI : 10.1145/359576.359585

B. Charron-bost, F. Mattern, and G. Tel, Synchronous, asynchronous, and causally ordered communication, Distributed Computing, vol.18, issue.2, pp.173-191, 1996.
DOI : 10.1007/s004460050018

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.5364

D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988.
DOI : 10.1007/BF00206326

Y. Chen and W. Tsai, Towards dependable service-orientated computing systems. Simulation Modelling Practice and Theory, pp.1361-1366, 2009.
DOI : 10.1016/j.simpat.2009.06.009

K. Cheverst, M. Fitton, C. Rouncefield, and . Graham, Smart mobs? and technology probes: Evaluting texting at work, The 11th European Conference on Information Technology Evaluation, pp.73-80, 2004.

S. Chiaradonna, F. D. Giandomenico, and P. Lollini, Interdependency Analysis in Electric Power Systems, Critical Information Infrastructure security -3rd International Workshop CRITIS, pp.60-71, 2008.
DOI : 10.1007/3-540-44667-2_9

H. Choi, V. G. Kulkarni, and K. S. Trivedi, Performance modeling using Markov regenerative stochastic Petri nets. Performance Evaluation, pp.1-3339, 1994.

G. Ciardo, A. Blakemore, P. Chimento, J. Muppala, and K. Trivedi, Automated Generation and Analysis of Markov Reward Models Using Stochastic Reward Nets, Linear Algebra, Markov Chains, and Queueing Models, IMA Volumes in Mathematics and its Applications, pp.145-191, 1993.
DOI : 10.1007/978-1-4613-8351-2_11

G. Ciardo, R. German, and C. Lindemann, A characterization of the stochastic process underlying a stochastic Petri net, IEEE Transactions on Software Engineering, vol.20, issue.7, pp.506-515, 1994.
DOI : 10.1109/32.297939

F. Ciesinski and C. Baier, Liquor: A tool for qualitative and quantitative linear time analysis of reactive systems, Proc. 3rd International Conference on Quantitative Evaluation of Systems (QEST'06), pp.131-132, 2006.

G. Clark, T. Courtney, D. Daly, D. D. Deavours, S. Derisavi et al., The Mobius modeling tool, Proceedings 9th International Workshop on Petri Nets and Performance Models, pp.241-250, 2001.
DOI : 10.1109/PNPM.2001.953373

E. Clarke and E. Emerson, Design and synthesis of synchronization skeletons for branching-time temporal logic, Proceedings of Workshop on Logic of Programs, pp.52-71, 1981.

E. Clarke, M. Fujita, P. Mcgeer, K. Mcmillan, J. Yang et al., Multi-terminal binary decision diagrams: An efficient data structure for matrix representation, Proc. International Workshop on Logic Synthesis (IWLS'93) Also available in Formal Methods in System Design, pp.1-15149, 1993.

M. Cohen, M. Dam, A. Lomuscio, and H. Qu, A data symmetry reduction technique for temporalepistemic logic, the 7th International Symposium on Automated Technology for Verification and Analysis, pp.69-83, 2009.

M. Cohen, M. Dam, A. Lomuscio, and H. Qu, A symmetry reduction technique for model checking temporal-epistemic logic, the 21st International Joint Conference on Artificial Intelligence, pp.721-726, 2009.

M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli, Fine Grained Access Control with Trust and Reputation Management for Globus, OTM Conferences, pp.1505-1515, 2007.
DOI : 10.1007/978-3-540-76843-2_26

C. Consortium, Deliverable 2.1 ? Capturing functional and non-functional connector be- haviours

G. Costa, N. Dragoni, A. Lazouski, F. Martinelli, F. Massacci et al., Extending security-bycontract with quantitative trust on mobile devices, IMIS'10: Proceedings of the 4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing, 2010.

G. Costa, F. Martinelli, P. Mori, C. Schaefer, and T. Walter, Runtime monitoring for next generation java me platform. Computers & Security, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00458909

G. Costa and I. Matteucci, Enforcing private policy via security-by-contract. Identity and Privacy Management. Special issue of the journal UPGRADE, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00458882

A. Crabtree, T. Hemmings, T. Rodden, K. Cheverst, K. Clarke et al., Designing with care: Adapting cultural probes to inform design in sensitive settings, OzCHI 2003, New Directions in Interaction: Information environments, Media and Technology, pp.4-13, 2003.

P. D. Argenio, B. Jeannet, H. Jensen, and K. Larsen, Reachability analysis of probabilistic systems by successive refinements, Proc. 1st Joint International Workshop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification (PAPM/PROBMIV'01), volume 2165 of LNCS, pp.39-56, 2001.

L. Desmet, W. Joosen, F. Massacci, P. Philippaerts, F. Piessens et al., Security-by-contract on the .NET platform, Information Security Technical Report, vol.13, issue.1, pp.25-32, 2008.
DOI : 10.1016/j.istr.2008.02.001

G. Dewsbury, Designing dependable digital domestic environments, HOIT 2003: The Networked Home and the Home of the Future, 2003.

G. Serugendo, Robustness and dependability of self-organizing systems -a safety engineering perspective, SSS, pp.254-268, 2009.

D. Marzo-serugendo, J. Fitzgerald, A. Romanovsky, and N. Guelfi, A metadata-based architectural model for dynamically resilient systems, Proceedings of the 2007 ACM symposium on Applied computing , SAC '07, pp.566-572, 2007.
DOI : 10.1145/1244002.1244132

M. Dmitriev, Selective profiling of java applications using dynamic bytecode instrumentation, IEEE International Symposium on, ISPASS Performance Analysis of Systems and Software, 2004, pp.141-150, 2004.
DOI : 10.1109/ISPASS.2004.1291366

P. Dourish and K. Anderson, Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena, Human-Computer Interaction, vol.290, issue.10, pp.319-342, 2006.
DOI : 10.1088/0963-6625/1/3/004

P. Dourish, R. Grinter, J. D. De-la-flor, and M. Joseph, Security in the wild: user strategies for managing security as an everyday, practical problem, Personal and Ubiquitous Computing, vol.36, issue.7, pp.391-401, 2004.
DOI : 10.1007/s00779-004-0308-5

N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer et al., Security-bycontract (SxC) for software and services of mobile systems. In At your service -Service-Oriented Computing from an EU Perspective, 2008.

N. Dragoni, F. Massacci, and K. Naliuka, Security-by-contract(SxC) for mobile systems-or how to download software on your mobile without regretting it, Position Papers for W3C Workshop on Security for Access to Device APIs from the Web, 2008.

K. Edwards, E. S. Poole, and J. Stoll, Security automation considered harmful? In NSPW?07, 2007.

R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi, Reasoning about Knowledge, 1995.

L. Falai, A. Bondavalli, and F. D. Giandomenico, Quantitative Evaluation of Distributed Algorithms Using the Neko Framework: The NekoStat Extension, 2nd Latin-American Symposium on Dependable Computing, pp.35-51, 2005.
DOI : 10.1007/11572329_6

A. Fehnker and P. Gao, Formal Verification and Simulation for Performance Analysis for Probabilistic Broadcast Protocols, Proc. 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW'06), pp.128-141, 2006.
DOI : 10.1007/11814764_12

L. Feldkuhn and J. Erickson, Event Management as a Common Functional Area of Open Systems Management, 1989.

C. Fetzer and K. Högstedt, Challenges in Making Pervasive Systems Dependable, 2003.
DOI : 10.1147/sj.384.0693

C. Fidge, Fundamentals of distributed system observation, IEEE Software, vol.13, issue.6, pp.77-83, 1996.
DOI : 10.1109/52.542297

B. Friedman, D. Hurley, D. C. Howe, E. Felten, and H. Nissenbaum, Users' conceptions of web security, CHI '02 extended abstracts on Human factors in computing systems , CHI '02, pp.746-747, 2002.
DOI : 10.1145/506443.506577

B. Friedman and P. Kahn, Human Values, Ethics, and Design. The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications

B. Friedman, P. Kahn, and A. Borning, Human-computer interaction in management information systems: Foundations, chapter Value Sensitive Design and information systems, pp.348-372

J. Gait, A probe effect in concurrent programs, Software: Practice and Experience, vol.7, issue.3, pp.225-233, 1986.
DOI : 10.1002/spe.4380160304

W. Gaver, A. Dunne, and E. Pacenti, Design: Cultural probes, interactions, vol.6, issue.1, pp.21-29, 1999.
DOI : 10.1145/291224.291235

C. Geertz, The Interpretation of Cultures. Basic Books, 1973.

M. Geimer, S. S. Shende, A. D. Malony, and F. Wolf, A Generic and Configurable Source-Code Instrumentation Component, Proceedings of the 9th International Conference on Computational Science, pp.696-705, 2009.
DOI : 10.1007/978-3-642-01973-9_78

R. German, Non-Markovian Analysis, Lectures on Formal Methods and Performance Analysis, pp.156-182
DOI : 10.1007/3-540-44667-2_4

J. Golbeck and J. Hendler, FilmTrust: movie recommendations using trust in web-based social networks, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006., pp.282-286, 2006.
DOI : 10.1109/CCNC.2006.1593032

T. Grandison and M. Sloman, A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, vol.3, issue.4, pp.2-16, 2000.
DOI : 10.1109/COMST.2000.5340804

P. Greci, F. Martinelli, and I. Matteucci, A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application, ISoLA, pp.221-236, 2008.
DOI : 10.1016/j.entcs.2007.03.025

G. Guirado, T. Hérault, R. Lassaigne, and S. Peyronnet, Distribution, Approximation and Probabilistic Model Checking, Proc. 4th International Workshop on Parallel and Distributed Methods in Verification (PDMC'05), pp.19-30, 2005.
DOI : 10.1016/j.entcs.2005.10.016

Z. J. Haas, J. Y. Halpern, and L. Li, Gossip-based ad hoc routing, IEEE/ACM Transactions on Networking, vol.14, issue.3, pp.479-491, 2006.
DOI : 10.1109/TNET.2006.876186

H. Hallal, S. Boroday, A. Petrenko, and A. Ulrich, A formal approach to property testing in causally consistent distributed traces, Formal Aspects of Computing, vol.18, issue.1, pp.63-83, 2006.
DOI : 10.1007/s00165-005-0082-9

H. Hansson and B. Jonsson, A logic for reasoning about time and reliability, Formal Aspects of Computing, vol.2, issue.1, pp.512-535, 1994.
DOI : 10.1007/BF01211866

M. Haque and S. Ahamed, An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment, 31st Annual International Computer Software and Applications Conference, Vol. 1- (COMPSAC 2007), 2007.
DOI : 10.1109/COMPSAC.2007.69

B. R. Haverkort, Markovian Models for Performance and Dependability Evaluation, Lectures on Formal Methods and Performance Analysis, pp.38-83, 2001.
DOI : 10.1007/3-540-44667-2_2

S. Herring, L. Scheidt, S. Bonus, and E. Wright, Bridging the gap: a genre analysis of Weblogs, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004.
DOI : 10.1109/HICSS.2004.1265271

A. Hinton, M. Kwiatkowska, G. Norman, and D. Parker, PRISM: A Tool for Automatic Verification of Probabilistic Systems, Proc. 12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'06), pp.441-444, 2006.
DOI : 10.1007/11691372_29

E. Hollnagel, D. D. Woods, and N. Leveson, Resilience engineering: concepts and precepts, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00572766

R. A. Howard, Dynamic Probabilistic Systems: Markov Models, volume 1 of Decision and Control, 1971.

J. Hughes, V. King, T. Rodden, and H. Andersen, Moving out from the control room, Proceedings of the 1994 ACM conference on Computer supported cooperative work , CSCW '94, 1994.
DOI : 10.1145/192844.193065

H. Hutchinson, W. Mackay, and B. Westerlund, Technology probes, Proceedings of the conference on Human factors in computing systems , CHI '03, pp.17-24, 2003.
DOI : 10.1145/642611.642616

P. Inverardi and M. Nesi, Deciding observational congruence of finite-state CCS expressions by rewriting, Theoretical Computer Science, vol.139, issue.1-2, pp.315-354, 1995.
DOI : 10.1016/0304-3975(94)00074-S

D. Jansen, J. Katoen, M. Oldenkamp, M. Stoelinga, and I. Zapreev, How Fast and Fat Is Your Probabilistic Model Checker? An Experimental Performance Comparison, Hardware and Software: Verification and Testing, the 3 rd International Haifa Verification Conference LNCS 4899, pp.69-85, 2007.
DOI : 10.1007/978-3-540-77966-7_9

B. Jeannet, P. D. Argenio, and K. Larsen, Rapture: A tool for verifying Markov decision processes, Proc. Tools Day, affiliated to 13th Int. Conf. Concurrency Theory (CONCUR'02), pp.84-98, 2002.

A. Jøsang and S. Pope, Semantic constraints for trust transitivity, APCCM: 2nd Asia-Pacific conference on Conceptual modelling, pp.59-68, 2005.

J. Joyce, G. Lomow, K. Slind, and B. Unger, Monitoring distributed systems, ACM Transactions on Computer Systems, vol.5, issue.2, pp.121-150, 1987.
DOI : 10.1145/13677.22723

J. Katoen, E. Hahn, H. Hermanns, D. Jansen, and I. Zapreev, The ins and outs of the probabilistic model checker MRMC, Proc. 6th International Conference on Quantitative Evaluation of Systems (QEST'09, 2009.

Y. Kim and K. Doh, Trust Type Based Semantic Web Services Assessment and Selection, 2008 10th International Conference on Advanced Communication Technology, pp.2048-2053, 2008.
DOI : 10.1109/ICACT.2008.4494190

T. Kindberg, M. Spasojevic, R. Fleck, and A. Sellen, The Ubiquitous Camera: An In-Depth Study of Camera Phone Use, IEEE Pervasive Computing, vol.4, issue.2, pp.42-50, 2005.
DOI : 10.1109/MPRV.2005.42

H. Koshutanski, A. Lazouski, F. Martinelli, and P. Mori, Enhancing grid security by fine-grained behavioral control and negotiation-based authorization, International Journal of Information Security, vol.6, issue.1, pp.291-314, 2009.
DOI : 10.1007/s10207-009-0083-4

H. Koshutanski, F. Martinelli, P. Mori, L. Borz, and A. Vaccarelli, A Fine-Grained and X.509-Based Access Control System for Globus, In OTM, pp.1336-1350, 2006.
DOI : 10.1007/11914952_21

E. Kurvinen, Only when miss universe snatches me, Proceedings of the 2003 international conference on Designing pleasurable products and interfaces , DPPI '03, pp.98-102, 2003.
DOI : 10.1145/782896.782921

M. Kwiatkowska, G. Norman, and D. Parker, Probabilistic symbolic model checking with PRISM: a hybrid approach, International Journal on Software Tools for Technology Transfer, vol.24, issue.2, pp.128-142, 2004.
DOI : 10.1007/s10009-004-0140-2

M. Kwiatkowska, G. Norman, and D. Parker, Stochastic Model Checking, Formal Methods for the Design of Computer, Communication and Software Systems: Performance Evaluation (SFM'07), pp.220-270, 2007.
DOI : 10.1007/978-3-540-72522-0_6

M. Kwiatkowska, G. Norman, and D. Parker, Analysis of a gossip protocol in PRISM, ACM SIGMETRICS Performance Evaluation Review, vol.36, issue.3, pp.17-22, 2008.
DOI : 10.1145/1481506.1481511

M. Kwiatkowska, G. Norman, and D. Parker, PRISM, ACM SIGMETRICS Performance Evaluation Review, vol.36, issue.4, pp.40-45, 2009.
DOI : 10.1145/1530873.1530882

URL : https://hal.archives-ouvertes.fr/hal-00740727

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978.
DOI : 10.1145/359545.359563

J. Laprie, DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'., p.2, 1995.
DOI : 10.1109/FTCSH.1995.532603

J. Laprie, From dependability to resilience, 38th IEEE/IFIP Int. Conf. On Dependable Systems and Networks, 2008.

J. Laprie, Dependable computing: Concepts, limits, challenges, 25th IEEE Symposium on Fault-Tolerant Computing, pp.42-54, 1995.

C. Lenzen, T. Locher, and R. Wattenhofer, Tight bounds for clock synchronization, PODC '09: Proceedings of the 28th ACM symposium on Principles of distributed computing, pp.46-55, 2009.

J. Liu and V. Issarny, An incentive compatible reputation mechanism for ubiquitous computing environments, International Journal of Information Security, vol.43, issue.12, pp.297-311, 2007.
DOI : 10.1007/s10207-007-0029-7

URL : https://hal.archives-ouvertes.fr/inria-00415118

J. Liu and V. Issarny, An incentive compatible reputation mechanism for ubiquitous computing environments, International Journal of Information Security, vol.43, issue.12, pp.297-311, 2007.
DOI : 10.1007/s10207-007-0029-7

URL : https://hal.archives-ouvertes.fr/inria-00415118

P. Lollini, A. Bondavalli, and F. D. Giandomenico, A modeling methodology for hierarchical control system and its aplication, Journal of the Brazilian Computer Society, vol.38, issue.7, pp.57-69, 2005.
DOI : 10.1007/BF03192366

P. Lollini, A. Bondavalli, and F. D. Giandomenico, A Decomposition-Based Modeling Framework for Complex Systems, IEEE Transactions on Reliability, vol.58, issue.1, pp.20-33, 2009.
DOI : 10.1109/TR.2008.2011663

A. Lomuscio and W. Penczek, Ldyis: a framework for model checking security protocols, Fundamenta Informaticae, vol.85, issue.1-4, pp.359-375, 2008.

A. Lomuscio, H. Qu, and F. Raimondi, MCMAS: A Model Checker for the Verification of Multi-Agent Systems, Proceedings of CAV 2009, pp.682-688, 2009.
DOI : 10.1007/978-3-642-02658-4_55

A. Lomuscio, H. Qu, M. J. Sergot, and M. Solanki, Verifying Temporal and Epistemic Properties of Web Service Compositions, ICSOC, pp.456-461, 2007.
DOI : 10.1007/978-3-540-74974-5_43

A. Lomuscio and M. Sergot, Deontic interpreted systems, Studia Logica, vol.75, issue.1, pp.63-92, 2003.
DOI : 10.1023/A:1026176900459

A. Lomusico, H. Qu, and M. Solanki, Towards verifying contract regulated service composition, IEEE International Conference on Web Services, 2008.

N. Luhmann, Trust and Power, 1979.

N. Luhmann, Familiarity, confidence, trust: problems and alternatives, Trust: Making and Breaking Co-operative Relations, pp.94-107, 1990.

Z. Malik and A. Bouguettaya, Reputation Bootstrapping for Trust Establishment among Web Services, IEEE Internet Computing, vol.13, issue.1, pp.40-47, 2009.
DOI : 10.1109/MIC.2009.17

D. Manchala, Trust metrics, models and protocols for electronic commerce transactions, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183), pp.312-321, 1998.
DOI : 10.1109/ICDCS.1998.679731

M. Mansouri-samani and M. Sloman, Monitoring distributed systems, IEEE Network, vol.7, issue.6, pp.303-347, 1994.
DOI : 10.1109/65.244791

M. Mansouri-samani and M. Sloman, GEM: a generalized event monitoring language for distributed systems, Distributed Systems Engineering, vol.4, issue.2, pp.96-108, 1997.
DOI : 10.1088/0967-1846/4/2/004

S. Marsh, Formalising Trust as a Computational Concept, 1994.

F. Martinelli and M. Petrocchi, A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS, Electronic Notes in Theoretical Computer Science, vol.186, pp.85-99, 2007.
DOI : 10.1016/j.entcs.2007.03.024

P. M. Masci, S. Chiaradonna, and F. D. Giandomenico, Dependability Analysis of Diffusion Protocols in Wireless Networks with Heterogeneous Node Capabilities, 2010 European Dependable Computing Conference, 2009.
DOI : 10.1109/EDCC.2010.26

M. L. Massie, B. N. Chun, and D. E. Culler, The ganglia distributed monitoring system: design, implementation, and experience, Parallel Computing, vol.30, issue.7, pp.817-840, 2004.
DOI : 10.1016/j.parco.2004.04.001

R. Mcdougall, J. Mauro, and B. Gregg, Solaris(TM) Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris (Solaris Series), 2006.

J. F. Meyer, Performability: a retrospective and some pointers to the future, Performance Evaluation, vol.14, issue.3-4, pp.139-156, 1992.
DOI : 10.1016/0166-5316(92)90002-X

M. K. Molloy, Performance Analysis Using Stochastic Petri Nets, IEEE Transactions on Computers, vol.31, issue.9, pp.913-917, 1982.
DOI : 10.1109/TC.1982.1676110

R. J. Moore, Dynamic probes and generalised kernel hooks interface for linux, Proceedings of the 4th annual Linux Showcase & Conference, pp.35-35, 2000.

A. Movaghar and J. F. Meyer, Performability modelling with stochastic activity networks, Real-Time Systems Symposium, pp.215-224, 1984.

J. K. Muppala, R. M. Fricks, and K. S. Trivedi, Techniques for system dependability evaluation The Netherlands, Computational Probability of Operations Research and Management Science, pp.445-480, 2000.

O. Naím and A. Hey, Invasiveness of performance instrumentation measurements on multiprocessors, 1994.

S. Naqvi, P. Massonet, B. Aziz, A. Arenas, F. Martinelli et al., Fine-Grained Continuous Usage Control of Service Based Grids ??? The GridTrust Approach, Service- Wave '08: Proceedings of the 1st European Conference on Towards a Service-Based Internet, pp.242-253, 2008.
DOI : 10.1007/978-3-540-89897-9_21

B. Nardi, D. Schiano, and M. Gumbrecht, Blogging as social activity, or, would you let 900 million people read your diary?, Proceedings of the 2004 ACM conference on Computer supported cooperative work , CSCW '04, 2004.
DOI : 10.1145/1031607.1031643

S. Nepal, Z. Malik, and A. Bouguettaya, Reputation Propagation in Composite Services, 2009 IEEE International Conference on Web Services, pp.295-302, 2009.
DOI : 10.1109/ICWS.2009.54

D. M. Nicol, W. H. Sanders, and K. S. Trivedi, Model-based evaluation: from dependability to security, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.48-65, 2004.
DOI : 10.1109/TDSC.2004.11

G. Norman and V. Shmatikov, Analysis of Probabilistic Contract Signing, Journal of Computer Security, vol.14, issue.6, pp.561-589, 2006.
DOI : 10.1007/978-3-540-40981-6_9

P. Nurmi, A Bayesian framework for online reputation systems, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), pp.121-121, 2006.
DOI : 10.1109/AICT-ICIW.2006.2

A. Nusayr, AOP as a formal framework for runtime monitoring, Proceedings of the 2008 Foundations of Software Engineering Doctoral Symposium on, FSEDS '08, pp.25-28, 2008.
DOI : 10.1145/1496653.1496660

T. Ojala, J. Korhonen, T. Sutinen, P. Parhi, and L. Aalto, Mobile karpat ? U a case study in wireless personal area networking, 2004.

D. Okabe, Emergent social practices, situations and relations through everyday camera phone use, Mobile Communication and Social Change, the 2004 International Conference on Mobile Communication, 2004.

S. Paradesi, P. Doshi, and S. Swaika, Integrating Behavioral Trust in Web Service Compositions, 2009 IEEE International Conference on Web Services, pp.453-460, 2009.
DOI : 10.1109/ICWS.2009.106

D. Parker, Implementation of Symbolic Model Checking for Probabilistic Systems, 2002.

N. W. Paton and O. Díaz, Active database systems, ACM Computing Surveys, vol.31, issue.1, pp.63-103, 1999.
DOI : 10.1145/311531.311623

F. Perich, J. Undercoffer, L. Kagal, A. Joshi, T. Finin et al., In reputation we believe: query processing in mobile ad-hoc networks, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004., pp.326-334, 2004.
DOI : 10.1109/MOBIQ.2004.1331739

P. R. Pietzuch, B. Shand, and J. Bacon, A Framework for Event Composition in Distributed Systems, Proceedings of the ACMUSENIX 2003 International Conference on Middleware, pp.62-82, 2003.
DOI : 10.1007/3-540-44892-6_4

K. Plummer, Documents of Life, 1983.
DOI : 10.4135/9781849208888

A. Pnueli, The temporal logic of programs, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.45-57, 1977.
DOI : 10.1109/SFCS.1977.32

S. Porcarelli, F. D. Giandomenico, A. Bondavalli, M. Barbera, and I. Mura, Service-level availability estimation of GPRS, IEEE Transactions on Mobile Computing, vol.2, issue.3, pp.233-247, 2003.
DOI : 10.1109/TMC.2003.1233529

A. Rahman and S. Hailes, Supporting trust in virtual communities, IEEE Hawaii International Conference on System Sciences, p.6007, 2000.

F. Raimondi and A. Lomuscio, Automatic verification of multi-agent systems by model checking via ordered binary decision diagrams, Journal of Applied Logic, vol.5, issue.2, pp.235-251, 2005.
DOI : 10.1016/j.jal.2005.12.010

B. Randell, Facing up to faults, Computer J, vol.45, issue.2, pp.95-106, 2000.

J. Rasmussen, New Technology and Human Error, chapter The definition of human error and a taxonomy for technical system design, 1987.

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker, A scalable content-addressable network, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.161-172, 2001.

J. Reason, Human Error, 1990.

M. Riedl, J. Schuster, and M. Siegle, Recent Extensions to the Stochastic Process Algebra Tool CASPA, 2008 Fifth International Conference on Quantitative Evaluation of Systems, pp.113-114, 2008.
DOI : 10.1109/QEST.2008.13

F. Romani, S. Chiaradonna, F. D. Giandomenico, and L. Simoncini, Simulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering Interdependencies, 10th IEEE High Assurance Systems Engineering Symposium (HASE'07), pp.305-312, 2007.
DOI : 10.1109/HASE.2007.24

R. Saadi, J. M. Pierson, and L. Brunie, T2D, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, p.2010
DOI : 10.1145/1774088.1774403

URL : https://hal.archives-ouvertes.fr/inria-00469649

W. H. Sanders and L. M. Malhis, Dependability evaluation using composed SAN-based reward models, Journal of Parallel and Distributed Computing, vol.15, issue.3, pp.238-254, 1992.
DOI : 10.1016/0743-7315(92)90006-9

W. H. Sanders and J. F. Meyer, A unified approach for specifying measures of performance, dependability , and performability. Dependable Computing and Fault-Tolerant Systems: Dependable Computing for Critical Applications, pp.215-237, 1991.

W. H. Sanders and J. F. Meyer, Stochastic Activity Networks: Formal Definitions and Concepts???, pp.315-343, 2002.
DOI : 10.1007/3-540-44667-2_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.5191

J. Sandhu, Universal Design, chapter Multi-Dimensional Evaluation as a tool in Teaching Universal Design, 2002.

D. C. Schmidt, Guest Editor's Introduction: Model-Driven Engineering, Computer, vol.39, issue.2, pp.25-31, 2006.
DOI : 10.1109/MC.2006.58

B. P. Shah, Analytic solution of stochastic activity networks with exponential and deterministic activities, 1993.

R. Silverstone, Television and Everyday Life, 1994.
DOI : 10.4324/9780203358948

C. Sodergard, Mobile television -technology and user experiences, report on the mobile tv project, 2003.

S. Song, K. Hwang, R. Zhou, and Y. Kwok, Trusted P2P Transactions with Fuzzy Reputation Aggregation, IEEE Internet Computing, vol.9, issue.6, pp.24-34, 2005.
DOI : 10.1109/MIC.2005.136

R. Spalazzese, P. Inverardi, and V. Issarny, Towards a formalization of mediating connectors for on the fly interoperability, 2009 Joint Working IEEE/IFIP Conference on Software Architecture & European Conference on Software Architecture, pp.345-348, 2009.
DOI : 10.1109/WICSA.2009.5290664

URL : https://hal.archives-ouvertes.fr/inria-00404308

M. Spezialetti and J. P. Kearns, A General Approach to Recognizing Event Occurences in Distributed Computations, ICDCS, pp.300-307, 1988.

W. J. Stewart, Introduction to the Numerical Solution of Markov Chains, 1994.

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.149-160, 2001.

T. Suganuma, T. Yasue, and T. Nakatani, An empirical study of method in-lining for a java just-intime compiler, Proceedings of the 2nd Java™ Virtual Machine Research and Technology Symposium, pp.91-104, 2002.

A. Taylor and R. Harper, Age-old practices in thé Snew world?: a study of gift-giving between teenage mobile phone users, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.439-446, 2002.

G. Theodorakopoulos and J. S. Baras, Trust evaluation in ad-hoc networks, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, pp.1-10, 2004.
DOI : 10.1145/1023646.1023648

M. Tribastone, The PEPA Plug-in Project, Fourth International Conference on the Quantitative Evaluation of Systems (QEST 2007), pp.53-54, 2007.
DOI : 10.1109/QEST.2007.34

K. S. Trivedi, Probability and Statistics with Reliability, Queueing and Computer Science Applications, 2002.

J. J. Tsai, K. Y. Fang, and H. Y. Chen, A noninvasive architecture to monitor real-time distributed systems, Computer, vol.23, issue.3, pp.11-23, 1990.
DOI : 10.1109/2.50269

L. Viljanen, Towards an Ontology of Trust, Lecture Notes in Computer Science, vol.3592, pp.175-184, 2005.
DOI : 10.1007/11537878_18

. Wikipedia, Beta distribution

L. Xiong and L. Liu, A reputation-based trust model for peer-to-peer ecommerce communities, 4th ACM conference on Electronic commerce, pp.228-229, 2003.

H. Younes, Ymer: A Statistical Model Checker, Proc. 17th International Conference on Computer Aided Verification (CAV'05), pp.429-433, 2005.
DOI : 10.1007/11513988_43

R. Zhou, K. Hwang, and M. Cai, Gossiptrust for fast reputation aggregation in peer-to-peer networks, IEEE Transactions on Knowledge and Data Engineering, pp.1282-1295, 2008.

C. Ziegler and J. Golbeck, Investigating correlations of trust and interest similarity-do birds of a feather really flock together. Decision Support Systems, 2005.

D. Zimmer, On the semantics of complex events in active database management systems, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337), p.392, 1999.
DOI : 10.1109/ICDE.1999.754955

P. R. Zimmermann, The official PGP user's guide, CONNECT, vol.231167, p.118118, 1995.