A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, Enhancing Java ME Security Support with Resource Usage Monitoring, ICICS, pp.256-266, 2008.
DOI : 10.1145/359576.359585

M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli, Fine Grained Access Control with Trust and Reputation Management for Globus, OTM Conferences, pp.1505-1515, 2007.
DOI : 10.1007/978-3-540-76843-2_26

G. Costa, F. Martinelli, P. Mori, C. Schaefer, and T. Walter, Runtime monitoring for next generation Java ME platform, Computers & Security, vol.29, issue.1, 2009.
DOI : 10.1016/j.cose.2009.07.005

URL : https://hal.archives-ouvertes.fr/inria-00458909

L. Desmet, W. Joosen, and F. Massacci, Pieter Philippaerts, Frank Piessens, Ida Siahaan, and Dries Vanoverberghe. Security-by-contract on the .net platform, pp.25-32, 2008.

N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer et al., Security-by-contract (SxC) for software and services of mobile systems. In At your service -Service-Oriented Computing from an EU Perspective, 2008.

N. Dragoni, F. Massacci, T. Walter, and C. Schaefer, What the heck is this application doing? -a securityby-contract architecture for pervasive services

A. Lazouski, F. Martinelli, F. Massacci, G. Costa, N. Dragoni et al., Extending Security-by-Contract with quantitative trust on mobile devices, Proceeding of CISIS 2010 The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, pp.872-877, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00536705

L. Gong and G. Ellison, Inside Java(TM) 2 Platform Security: Architecture, API Design, and Implementation, 2003.

L. Gong, Java security: present and near future, IEEE Micro, vol.17, issue.3, pp.14-19, 1997.
DOI : 10.1109/40.591650

P. Greci, F. Martinelli, and I. Matteucci, A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application, ISoLA, pp.221-236, 2008.
DOI : 10.1016/j.entcs.2007.03.025

K. Hoffman, D. Zage, and C. Nita-rotaru, A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol.42, issue.1, pp.1-31, 2009.
DOI : 10.1145/1592451.1592452

H. Koshutanski, F. Martinelli, P. Mori, L. Borz, and A. Vaccarelli, A Fine-Grained and X.509-Based Access Control System for Globus, In OTM, pp.1336-1350, 2006.
DOI : 10.1007/11914952_21

H. Koshutanski, A. Lazouski, F. Martinelli, and P. Mori, Enhancing grid security by fine-grained behavioral control and negotiation-based authorization, International Journal of Information Security, vol.6, issue.1, pp.291-314, 2009.
DOI : 10.1007/s10207-009-0083-4

J. Liu and V. Issarny, An incentive compatible reputation mechanism for ubiquitous computing environments, International Journal of Information Security, vol.43, issue.12, pp.297-311, 2007.
DOI : 10.1007/s10207-007-0029-7

URL : https://hal.archives-ouvertes.fr/inria-00415118

C. George and . Necula, Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Langauges (POPL '97), pp.106-119, 1997.

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker, A scalable contentaddressable network, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.161-172, 2001.

R. Saadi, J. M. Pierson, and L. Brunie, T2D, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.1472-1478, 2010.
DOI : 10.1145/1774088.1774403

URL : https://hal.archives-ouvertes.fr/inria-00469649

R. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, and S. A. Smolka, Model-Carrying Code (MCC), Proceedings of the 2001 workshop on New security paradigms , NSPW '01, pp.23-30, 2001.
DOI : 10.1145/508171.508175

R. Sekar, V. N. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. Duvarney, Model-carrying code: a practical approach for safe execution of untrusted applications, SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp.15-28, 2003.

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications he joined University of Trento as post-doctoral Research Fellow working on the S3MS project he also worked as freelance IT consultant, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communicationsUK) and the MIT Center for Collective Intelligence (USA) he is an assistant professor in security and distributed systems at the Department of Informatics and Mathematical Modelling at Denmark Technical University (DTU), pp.149-160, 2001.