Dif f ] which gives the difference (Diff) between the new and old trust relation of ,
Rep[E k ]] which is used to inform the Enabler A about any modification affecting the reputation of its trusted Enablers ,
State == success) then 09 ?-cTE i [co] = cTE i [co] + [? × (1 ? cTE i, pp.7-08 ,
15 ?BEGIN 16 ?-Old = eTE i [Ej]; -If (State == success) then 18 ?-BEGIN 19 ??eTE i [Ej] = eTE i, ? eTE i [Ej]) × Rec(Ej, co) × W (Con ,
?If (State == success) then 31 ??BEGIN 32 ??Dif f = ? × (1 ? R[Ej]) × Rec(Ej, co) × W (Con, co) 33 ??Send (Co_F eedback[Con, co, State = success]) to Ej ??Send (Co_F eedback[Con, co, State = f ail]) to Ej, H2(Ej) and H3, pp.36-37 ,
Towards verifying compliance in agent-based web service compositions, Proceedings of The Seventh International Joint Conference on Autonomous Agents and Multi-agent systems (AAMAS-08), pp.265-272, 2008. ,
A distributed trust model, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.48-60, 1997. ,
DOI : 10.1145/283699.283739
Event Specification and Processing for Advanced Applications: Generalization and Formalization, Lecture Notes in Computer Science, vol.4653, pp.369-379, 2007. ,
DOI : 10.1007/978-3-540-74469-6_37
A class of generalized stochastic Petri nets for the performance evaluation of multiprocessor systems, ACM Transactions on Computer Systems, vol.2, issue.2, pp.93-122, 1984. ,
DOI : 10.1145/190.191
On Petri nets with deterministic and exponentially distributed firing times Advances in Petri Nets, LNCS, vol.266, pp.132-145, 1987. ,
Operationally critical threat, asset, and vulnerability evaluation framework, version 1.0, 1999. ,
Alternating-time temporal logic, Journal of the ACM, vol.49, issue.5, pp.672-713, 2002. ,
DOI : 10.1145/585265.585270
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems, Journal of the American Society for Information Science and Technology, vol.18, issue.4, pp.528-537, 2006. ,
DOI : 10.1002/asi.20307
Design of fault-tolerant computers, Proceedings of the November 14-16, 1967, fall joint computer conference on, AFIPS '67 (Fall), pp.733-743, 1967. ,
DOI : 10.1145/1465611.1465708
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
Complexity of Co-operation: agent based models of competition and collaboration, 1997. ,
Algebraic decision diagrams and their applications, Proceedings of 1993 International Conference on Computer Aided Design (ICCAD), pp.188-191171, 1993. ,
DOI : 10.1109/ICCAD.1993.580054
On the Logical Characterisation of Performability Properties, Proc. 27th International Colloquium on Automata, Languages and Programming, pp.780-792 ,
DOI : 10.1007/3-540-45022-X_65
Model-checking algorithms for continuous-time markov chains, IEEE Transactions on Software Engineering, vol.29, issue.6, pp.524-541, 2003. ,
DOI : 10.1109/TSE.2003.1205180
Introduction to Stochastic Petri Nets, Lecture Notes in Computer Science, vol.2090, pp.84-155, 2000. ,
DOI : 10.1007/3-540-44667-2_3
Smart monitors for composed services, Proceedings of the 2nd international conference on Service oriented computing , ICSOC '04, pp.193-202, 2004. ,
DOI : 10.1145/1035167.1035195
ProbDiVinE-MC: Multi-core LTL Model Checker for Probabilistic Systems, 2008 Fifth International Conference on Quantitative Evaluation of Systems, pp.77-78, 2008. ,
DOI : 10.1109/QEST.2008.29
Toward the development of consumer-based criteria for the evaluation of assistive devices, The Journal of Rehabilitation Research and Development, vol.27, issue.4, pp.425-436, 1990. ,
DOI : 10.1682/JRRD.1990.10.0425
Scaling up SLA monitoring in pervasive environments, International workshop on Engineering of software services for pervasive environments in conjunction with the 6th ESEC/FSE joint meeting, ESSPE '07, pp.65-68, 2007. ,
DOI : 10.1145/1294904.1294914
Computer security impaired by legitimate users, Computers & Security, vol.23, issue.3, pp.253-264, 2004. ,
DOI : 10.1016/j.cose.2003.09.002
URL : https://hal.archives-ouvertes.fr/hal-00691818
Assume-guarantee testing, Proceedings of the 2005 conference on Specification and verification of component-based systems, 2005. ,
RECENT DEVELOPMENTS IN NON-MARKOVIAN STOCHASTIC PETRI NETS, Journal of Circuits, Systems and Computers, vol.08, issue.01, pp.119-158, 1998. ,
DOI : 10.1142/S0218126698000067
Non-exponential stochastic Petri nets: an overview of methods and techniques, Computer Systems Science and Engineering, vol.13, issue.6, pp.339-351, 1998. ,
How HCI interprets the probes, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, 2007. ,
DOI : 10.1145/1240624.1240789
Model-based evaluation as a support to the design of dependable systems, Dependable Computing Systems: Paradigms, Performance Issues, and Applications, pp.57-86, 2005. ,
Lessons from an ad hoc network test-bed: Middleware and routing issues, Ad Hoc & Sensor Wireless Networks, vol.1, issue.12, 2005. ,
Rail: code instrumentation for .net, Proceedings of the 2005 ACM symposium on Applied computing, pp.1282-1287, 2005. ,
Software monitoring with bounded overhead, 2008 IEEE International Symposium on Parallel and Distributed Processing, pp.1-8, 2008. ,
DOI : 10.1109/IPDPS.2008.4536433
Just what do the youth of today want? Technology appropriation by young people, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002. ,
DOI : 10.1109/HICSS.2002.994089
Enhancing Java ME Security Support with Resource Usage Monitoring, ICICS, pp.256-266, 2008. ,
DOI : 10.1145/359576.359585
Synchronous, asynchronous, and causally ordered communication, Distributed Computing, vol.18, issue.2, pp.173-191, 1996. ,
DOI : 10.1007/s004460050018
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.5364
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
Towards dependable service-orientated computing systems. Simulation Modelling Practice and Theory, pp.1361-1366, 2009. ,
DOI : 10.1016/j.simpat.2009.06.009
Smart mobs? and technology probes: Evaluting texting at work, The 11th European Conference on Information Technology Evaluation, pp.73-80, 2004. ,
Interdependency Analysis in Electric Power Systems, Critical Information Infrastructure security -3rd International Workshop CRITIS, pp.60-71, 2008. ,
DOI : 10.1007/3-540-44667-2_9
Performance modeling using Markov regenerative stochastic Petri nets. Performance Evaluation, pp.1-3339, 1994. ,
Automated Generation and Analysis of Markov Reward Models Using Stochastic Reward Nets, Linear Algebra, Markov Chains, and Queueing Models, IMA Volumes in Mathematics and its Applications, pp.145-191, 1993. ,
DOI : 10.1007/978-1-4613-8351-2_11
A characterization of the stochastic process underlying a stochastic Petri net, IEEE Transactions on Software Engineering, vol.20, issue.7, pp.506-515, 1994. ,
DOI : 10.1109/32.297939
Liquor: A tool for qualitative and quantitative linear time analysis of reactive systems, Proc. 3rd International Conference on Quantitative Evaluation of Systems (QEST'06), pp.131-132, 2006. ,
The Mobius modeling tool, Proceedings 9th International Workshop on Petri Nets and Performance Models, pp.241-250, 2001. ,
DOI : 10.1109/PNPM.2001.953373
Design and synthesis of synchronization skeletons for branching-time temporal logic, Proceedings of Workshop on Logic of Programs, pp.52-71, 1981. ,
Multi-terminal binary decision diagrams: An efficient data structure for matrix representation, Proc. International Workshop on Logic Synthesis (IWLS'93) Also available in Formal Methods in System Design, pp.1-15149, 1993. ,
A data symmetry reduction technique for temporalepistemic logic, the 7th International Symposium on Automated Technology for Verification and Analysis, pp.69-83, 2009. ,
A symmetry reduction technique for model checking temporal-epistemic logic, the 21st International Joint Conference on Artificial Intelligence, pp.721-726, 2009. ,
Fine Grained Access Control with Trust and Reputation Management for Globus, OTM Conferences, pp.1505-1515, 2007. ,
DOI : 10.1007/978-3-540-76843-2_26
Deliverable 2.1 ? Capturing functional and non-functional connector be- haviours ,
Extending security-bycontract with quantitative trust on mobile devices, IMIS'10: Proceedings of the 4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing, 2010. ,
Runtime monitoring for next generation java me platform. Computers & Security, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00458909
Enforcing private policy via security-by-contract. Identity and Privacy Management. Special issue of the journal UPGRADE, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00458882
Designing with care: Adapting cultural probes to inform design in sensitive settings, OzCHI 2003, New Directions in Interaction: Information environments, Media and Technology, pp.4-13, 2003. ,
Reachability analysis of probabilistic systems by successive refinements, Proc. 1st Joint International Workshop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification (PAPM/PROBMIV'01), volume 2165 of LNCS, pp.39-56, 2001. ,
Security-by-contract on the .NET platform, Information Security Technical Report, vol.13, issue.1, pp.25-32, 2008. ,
DOI : 10.1016/j.istr.2008.02.001
Designing dependable digital domestic environments, HOIT 2003: The Networked Home and the Home of the Future, 2003. ,
Robustness and dependability of self-organizing systems -a safety engineering perspective, SSS, pp.254-268, 2009. ,
A metadata-based architectural model for dynamically resilient systems, Proceedings of the 2007 ACM symposium on Applied computing , SAC '07, pp.566-572, 2007. ,
DOI : 10.1145/1244002.1244132
Selective profiling of java applications using dynamic bytecode instrumentation, IEEE International Symposium on, ISPASS Performance Analysis of Systems and Software, 2004, pp.141-150, 2004. ,
DOI : 10.1109/ISPASS.2004.1291366
Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena, Human-Computer Interaction, vol.290, issue.10, pp.319-342, 2006. ,
DOI : 10.1088/0963-6625/1/3/004
Security in the wild: user strategies for managing security as an everyday, practical problem, Personal and Ubiquitous Computing, vol.36, issue.7, pp.391-401, 2004. ,
DOI : 10.1007/s00779-004-0308-5
Security-bycontract (SxC) for software and services of mobile systems. In At your service -Service-Oriented Computing from an EU Perspective, 2008. ,
Security-by-contract(SxC) for mobile systems-or how to download software on your mobile without regretting it, Position Papers for W3C Workshop on Security for Access to Device APIs from the Web, 2008. ,
Security automation considered harmful? In NSPW?07, 2007. ,
Reasoning about Knowledge, 1995. ,
Quantitative Evaluation of Distributed Algorithms Using the Neko Framework: The NekoStat Extension, 2nd Latin-American Symposium on Dependable Computing, pp.35-51, 2005. ,
DOI : 10.1007/11572329_6
Formal Verification and Simulation for Performance Analysis for Probabilistic Broadcast Protocols, Proc. 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW'06), pp.128-141, 2006. ,
DOI : 10.1007/11814764_12
Event Management as a Common Functional Area of Open Systems Management, 1989. ,
Challenges in Making Pervasive Systems Dependable, 2003. ,
DOI : 10.1147/sj.384.0693
Fundamentals of distributed system observation, IEEE Software, vol.13, issue.6, pp.77-83, 1996. ,
DOI : 10.1109/52.542297
Users' conceptions of web security, CHI '02 extended abstracts on Human factors in computing systems , CHI '02, pp.746-747, 2002. ,
DOI : 10.1145/506443.506577
Human Values, Ethics, and Design. The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications ,
Human-computer interaction in management information systems: Foundations, chapter Value Sensitive Design and information systems, pp.348-372 ,
A probe effect in concurrent programs, Software: Practice and Experience, vol.7, issue.3, pp.225-233, 1986. ,
DOI : 10.1002/spe.4380160304
Design: Cultural probes, interactions, vol.6, issue.1, pp.21-29, 1999. ,
DOI : 10.1145/291224.291235
The Interpretation of Cultures. Basic Books, 1973. ,
A Generic and Configurable Source-Code Instrumentation Component, Proceedings of the 9th International Conference on Computational Science, pp.696-705, 2009. ,
DOI : 10.1007/978-3-642-01973-9_78
Non-Markovian Analysis, Lectures on Formal Methods and Performance Analysis, pp.156-182 ,
DOI : 10.1007/3-540-44667-2_4
FilmTrust: movie recommendations using trust in web-based social networks, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006., pp.282-286, 2006. ,
DOI : 10.1109/CCNC.2006.1593032
A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, vol.3, issue.4, pp.2-16, 2000. ,
DOI : 10.1109/COMST.2000.5340804
A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application, ISoLA, pp.221-236, 2008. ,
DOI : 10.1016/j.entcs.2007.03.025
Distribution, Approximation and Probabilistic Model Checking, Proc. 4th International Workshop on Parallel and Distributed Methods in Verification (PDMC'05), pp.19-30, 2005. ,
DOI : 10.1016/j.entcs.2005.10.016
Gossip-based ad hoc routing, IEEE/ACM Transactions on Networking, vol.14, issue.3, pp.479-491, 2006. ,
DOI : 10.1109/TNET.2006.876186
A formal approach to property testing in causally consistent distributed traces, Formal Aspects of Computing, vol.18, issue.1, pp.63-83, 2006. ,
DOI : 10.1007/s00165-005-0082-9
A logic for reasoning about time and reliability, Formal Aspects of Computing, vol.2, issue.1, pp.512-535, 1994. ,
DOI : 10.1007/BF01211866
An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment, 31st Annual International Computer Software and Applications Conference, Vol. 1- (COMPSAC 2007), 2007. ,
DOI : 10.1109/COMPSAC.2007.69
Markovian Models for Performance and Dependability Evaluation, Lectures on Formal Methods and Performance Analysis, pp.38-83, 2001. ,
DOI : 10.1007/3-540-44667-2_2
Bridging the gap: a genre analysis of Weblogs, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004. ,
DOI : 10.1109/HICSS.2004.1265271
PRISM: A Tool for Automatic Verification of Probabilistic Systems, Proc. 12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'06), pp.441-444, 2006. ,
DOI : 10.1007/11691372_29
Resilience engineering: concepts and precepts, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00572766
Dynamic Probabilistic Systems: Markov Models, volume 1 of Decision and Control, 1971. ,
Moving out from the control room, Proceedings of the 1994 ACM conference on Computer supported cooperative work , CSCW '94, 1994. ,
DOI : 10.1145/192844.193065
Technology probes, Proceedings of the conference on Human factors in computing systems , CHI '03, pp.17-24, 2003. ,
DOI : 10.1145/642611.642616
Deciding observational congruence of finite-state CCS expressions by rewriting, Theoretical Computer Science, vol.139, issue.1-2, pp.315-354, 1995. ,
DOI : 10.1016/0304-3975(94)00074-S
How Fast and Fat Is Your Probabilistic Model Checker? An Experimental Performance Comparison, Hardware and Software: Verification and Testing, the 3 rd International Haifa Verification Conference LNCS 4899, pp.69-85, 2007. ,
DOI : 10.1007/978-3-540-77966-7_9
Rapture: A tool for verifying Markov decision processes, Proc. Tools Day, affiliated to 13th Int. Conf. Concurrency Theory (CONCUR'02), pp.84-98, 2002. ,
Semantic constraints for trust transitivity, APCCM: 2nd Asia-Pacific conference on Conceptual modelling, pp.59-68, 2005. ,
Monitoring distributed systems, ACM Transactions on Computer Systems, vol.5, issue.2, pp.121-150, 1987. ,
DOI : 10.1145/13677.22723
The ins and outs of the probabilistic model checker MRMC, Proc. 6th International Conference on Quantitative Evaluation of Systems (QEST'09, 2009. ,
Trust Type Based Semantic Web Services Assessment and Selection, 2008 10th International Conference on Advanced Communication Technology, pp.2048-2053, 2008. ,
DOI : 10.1109/ICACT.2008.4494190
The Ubiquitous Camera: An In-Depth Study of Camera Phone Use, IEEE Pervasive Computing, vol.4, issue.2, pp.42-50, 2005. ,
DOI : 10.1109/MPRV.2005.42
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization, International Journal of Information Security, vol.6, issue.1, pp.291-314, 2009. ,
DOI : 10.1007/s10207-009-0083-4
A Fine-Grained and X.509-Based Access Control System for Globus, In OTM, pp.1336-1350, 2006. ,
DOI : 10.1007/11914952_21
Only when miss universe snatches me, Proceedings of the 2003 international conference on Designing pleasurable products and interfaces , DPPI '03, pp.98-102, 2003. ,
DOI : 10.1145/782896.782921
Probabilistic symbolic model checking with PRISM: a hybrid approach, International Journal on Software Tools for Technology Transfer, vol.24, issue.2, pp.128-142, 2004. ,
DOI : 10.1007/s10009-004-0140-2
Stochastic Model Checking, Formal Methods for the Design of Computer, Communication and Software Systems: Performance Evaluation (SFM'07), pp.220-270, 2007. ,
DOI : 10.1007/978-3-540-72522-0_6
Analysis of a gossip protocol in PRISM, ACM SIGMETRICS Performance Evaluation Review, vol.36, issue.3, pp.17-22, 2008. ,
DOI : 10.1145/1481506.1481511
PRISM, ACM SIGMETRICS Performance Evaluation Review, vol.36, issue.4, pp.40-45, 2009. ,
DOI : 10.1145/1530873.1530882
URL : https://hal.archives-ouvertes.fr/hal-00740727
Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978. ,
DOI : 10.1145/359545.359563
DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'., p.2, 1995. ,
DOI : 10.1109/FTCSH.1995.532603
From dependability to resilience, 38th IEEE/IFIP Int. Conf. On Dependable Systems and Networks, 2008. ,
Dependable computing: Concepts, limits, challenges, 25th IEEE Symposium on Fault-Tolerant Computing, pp.42-54, 1995. ,
Tight bounds for clock synchronization, PODC '09: Proceedings of the 28th ACM symposium on Principles of distributed computing, pp.46-55, 2009. ,
An incentive compatible reputation mechanism for ubiquitous computing environments, International Journal of Information Security, vol.43, issue.12, pp.297-311, 2007. ,
DOI : 10.1007/s10207-007-0029-7
URL : https://hal.archives-ouvertes.fr/inria-00415118
An incentive compatible reputation mechanism for ubiquitous computing environments, International Journal of Information Security, vol.43, issue.12, pp.297-311, 2007. ,
DOI : 10.1007/s10207-007-0029-7
URL : https://hal.archives-ouvertes.fr/inria-00415118
A modeling methodology for hierarchical control system and its aplication, Journal of the Brazilian Computer Society, vol.38, issue.7, pp.57-69, 2005. ,
DOI : 10.1007/BF03192366
A Decomposition-Based Modeling Framework for Complex Systems, IEEE Transactions on Reliability, vol.58, issue.1, pp.20-33, 2009. ,
DOI : 10.1109/TR.2008.2011663
Ldyis: a framework for model checking security protocols, Fundamenta Informaticae, vol.85, issue.1-4, pp.359-375, 2008. ,
MCMAS: A Model Checker for the Verification of Multi-Agent Systems, Proceedings of CAV 2009, pp.682-688, 2009. ,
DOI : 10.1007/978-3-642-02658-4_55
Verifying Temporal and Epistemic Properties of Web Service Compositions, ICSOC, pp.456-461, 2007. ,
DOI : 10.1007/978-3-540-74974-5_43
Deontic interpreted systems, Studia Logica, vol.75, issue.1, pp.63-92, 2003. ,
DOI : 10.1023/A:1026176900459
Towards verifying contract regulated service composition, IEEE International Conference on Web Services, 2008. ,
Trust and Power, 1979. ,
Familiarity, confidence, trust: problems and alternatives, Trust: Making and Breaking Co-operative Relations, pp.94-107, 1990. ,
Reputation Bootstrapping for Trust Establishment among Web Services, IEEE Internet Computing, vol.13, issue.1, pp.40-47, 2009. ,
DOI : 10.1109/MIC.2009.17
Trust metrics, models and protocols for electronic commerce transactions, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183), pp.312-321, 1998. ,
DOI : 10.1109/ICDCS.1998.679731
Monitoring distributed systems, IEEE Network, vol.7, issue.6, pp.303-347, 1994. ,
DOI : 10.1109/65.244791
GEM: a generalized event monitoring language for distributed systems, Distributed Systems Engineering, vol.4, issue.2, pp.96-108, 1997. ,
DOI : 10.1088/0967-1846/4/2/004
Formalising Trust as a Computational Concept, 1994. ,
A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS, Electronic Notes in Theoretical Computer Science, vol.186, pp.85-99, 2007. ,
DOI : 10.1016/j.entcs.2007.03.024
Dependability Analysis of Diffusion Protocols in Wireless Networks with Heterogeneous Node Capabilities, 2010 European Dependable Computing Conference, 2009. ,
DOI : 10.1109/EDCC.2010.26
The ganglia distributed monitoring system: design, implementation, and experience, Parallel Computing, vol.30, issue.7, pp.817-840, 2004. ,
DOI : 10.1016/j.parco.2004.04.001
Solaris(TM) Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris (Solaris Series), 2006. ,
Performability: a retrospective and some pointers to the future, Performance Evaluation, vol.14, issue.3-4, pp.139-156, 1992. ,
DOI : 10.1016/0166-5316(92)90002-X
Performance Analysis Using Stochastic Petri Nets, IEEE Transactions on Computers, vol.31, issue.9, pp.913-917, 1982. ,
DOI : 10.1109/TC.1982.1676110
Dynamic probes and generalised kernel hooks interface for linux, Proceedings of the 4th annual Linux Showcase & Conference, pp.35-35, 2000. ,
Performability modelling with stochastic activity networks, Real-Time Systems Symposium, pp.215-224, 1984. ,
Techniques for system dependability evaluation The Netherlands, Computational Probability of Operations Research and Management Science, pp.445-480, 2000. ,
Invasiveness of performance instrumentation measurements on multiprocessors, 1994. ,
Fine-Grained Continuous Usage Control of Service Based Grids ??? The GridTrust Approach, Service- Wave '08: Proceedings of the 1st European Conference on Towards a Service-Based Internet, pp.242-253, 2008. ,
DOI : 10.1007/978-3-540-89897-9_21
Blogging as social activity, or, would you let 900 million people read your diary?, Proceedings of the 2004 ACM conference on Computer supported cooperative work , CSCW '04, 2004. ,
DOI : 10.1145/1031607.1031643
Reputation Propagation in Composite Services, 2009 IEEE International Conference on Web Services, pp.295-302, 2009. ,
DOI : 10.1109/ICWS.2009.54
Model-based evaluation: from dependability to security, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.48-65, 2004. ,
DOI : 10.1109/TDSC.2004.11
Analysis of Probabilistic Contract Signing, Journal of Computer Security, vol.14, issue.6, pp.561-589, 2006. ,
DOI : 10.1007/978-3-540-40981-6_9
A Bayesian framework for online reputation systems, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), pp.121-121, 2006. ,
DOI : 10.1109/AICT-ICIW.2006.2
AOP as a formal framework for runtime monitoring, Proceedings of the 2008 Foundations of Software Engineering Doctoral Symposium on, FSEDS '08, pp.25-28, 2008. ,
DOI : 10.1145/1496653.1496660
Mobile karpat ? U a case study in wireless personal area networking, 2004. ,
Emergent social practices, situations and relations through everyday camera phone use, Mobile Communication and Social Change, the 2004 International Conference on Mobile Communication, 2004. ,
Integrating Behavioral Trust in Web Service Compositions, 2009 IEEE International Conference on Web Services, pp.453-460, 2009. ,
DOI : 10.1109/ICWS.2009.106
Implementation of Symbolic Model Checking for Probabilistic Systems, 2002. ,
Active database systems, ACM Computing Surveys, vol.31, issue.1, pp.63-103, 1999. ,
DOI : 10.1145/311531.311623
In reputation we believe: query processing in mobile ad-hoc networks, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004., pp.326-334, 2004. ,
DOI : 10.1109/MOBIQ.2004.1331739
A Framework for Event Composition in Distributed Systems, Proceedings of the ACMUSENIX 2003 International Conference on Middleware, pp.62-82, 2003. ,
DOI : 10.1007/3-540-44892-6_4
Documents of Life, 1983. ,
DOI : 10.4135/9781849208888
The temporal logic of programs, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.45-57, 1977. ,
DOI : 10.1109/SFCS.1977.32
Service-level availability estimation of GPRS, IEEE Transactions on Mobile Computing, vol.2, issue.3, pp.233-247, 2003. ,
DOI : 10.1109/TMC.2003.1233529
Supporting trust in virtual communities, IEEE Hawaii International Conference on System Sciences, p.6007, 2000. ,
Automatic verification of multi-agent systems by model checking via ordered binary decision diagrams, Journal of Applied Logic, vol.5, issue.2, pp.235-251, 2005. ,
DOI : 10.1016/j.jal.2005.12.010
Facing up to faults, Computer J, vol.45, issue.2, pp.95-106, 2000. ,
New Technology and Human Error, chapter The definition of human error and a taxonomy for technical system design, 1987. ,
A scalable content-addressable network, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.161-172, 2001. ,
Human Error, 1990. ,
Recent Extensions to the Stochastic Process Algebra Tool CASPA, 2008 Fifth International Conference on Quantitative Evaluation of Systems, pp.113-114, 2008. ,
DOI : 10.1109/QEST.2008.13
Simulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering Interdependencies, 10th IEEE High Assurance Systems Engineering Symposium (HASE'07), pp.305-312, 2007. ,
DOI : 10.1109/HASE.2007.24
T2D, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, p.2010 ,
DOI : 10.1145/1774088.1774403
URL : https://hal.archives-ouvertes.fr/inria-00469649
Dependability evaluation using composed SAN-based reward models, Journal of Parallel and Distributed Computing, vol.15, issue.3, pp.238-254, 1992. ,
DOI : 10.1016/0743-7315(92)90006-9
A unified approach for specifying measures of performance, dependability , and performability. Dependable Computing and Fault-Tolerant Systems: Dependable Computing for Critical Applications, pp.215-237, 1991. ,
Stochastic Activity Networks: Formal Definitions and Concepts???, pp.315-343, 2002. ,
DOI : 10.1007/3-540-44667-2_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.5191
Universal Design, chapter Multi-Dimensional Evaluation as a tool in Teaching Universal Design, 2002. ,
Guest Editor's Introduction: Model-Driven Engineering, Computer, vol.39, issue.2, pp.25-31, 2006. ,
DOI : 10.1109/MC.2006.58
Analytic solution of stochastic activity networks with exponential and deterministic activities, 1993. ,
Television and Everyday Life, 1994. ,
DOI : 10.4324/9780203358948
Mobile television -technology and user experiences, report on the mobile tv project, 2003. ,
Trusted P2P Transactions with Fuzzy Reputation Aggregation, IEEE Internet Computing, vol.9, issue.6, pp.24-34, 2005. ,
DOI : 10.1109/MIC.2005.136
Towards a formalization of mediating connectors for on the fly interoperability, 2009 Joint Working IEEE/IFIP Conference on Software Architecture & European Conference on Software Architecture, pp.345-348, 2009. ,
DOI : 10.1109/WICSA.2009.5290664
URL : https://hal.archives-ouvertes.fr/inria-00404308
A General Approach to Recognizing Event Occurences in Distributed Computations, ICDCS, pp.300-307, 1988. ,
Introduction to the Numerical Solution of Markov Chains, 1994. ,
Chord: A scalable peer-to-peer lookup service for internet applications, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.149-160, 2001. ,
An empirical study of method in-lining for a java just-intime compiler, Proceedings of the 2nd Java™ Virtual Machine Research and Technology Symposium, pp.91-104, 2002. ,
Age-old practices in thé Snew world?: a study of gift-giving between teenage mobile phone users, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.439-446, 2002. ,
Trust evaluation in ad-hoc networks, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, pp.1-10, 2004. ,
DOI : 10.1145/1023646.1023648
The PEPA Plug-in Project, Fourth International Conference on the Quantitative Evaluation of Systems (QEST 2007), pp.53-54, 2007. ,
DOI : 10.1109/QEST.2007.34
Probability and Statistics with Reliability, Queueing and Computer Science Applications, 2002. ,
A noninvasive architecture to monitor real-time distributed systems, Computer, vol.23, issue.3, pp.11-23, 1990. ,
DOI : 10.1109/2.50269
Towards an Ontology of Trust, Lecture Notes in Computer Science, vol.3592, pp.175-184, 2005. ,
DOI : 10.1007/11537878_18
Beta distribution ,
A reputation-based trust model for peer-to-peer ecommerce communities, 4th ACM conference on Electronic commerce, pp.228-229, 2003. ,
Ymer: A Statistical Model Checker, Proc. 17th International Conference on Computer Aided Verification (CAV'05), pp.429-433, 2005. ,
DOI : 10.1007/11513988_43
Gossiptrust for fast reputation aggregation in peer-to-peer networks, IEEE Transactions on Knowledge and Data Engineering, pp.1282-1295, 2008. ,
Investigating correlations of trust and interest similarity-do birds of a feather really flock together. Decision Support Systems, 2005. ,
On the semantics of complex events in active database management systems, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337), p.392, 1999. ,
DOI : 10.1109/ICDE.1999.754955
The official PGP user's guide, CONNECT, vol.231167, p.118118, 1995. ,