A distributed trust model, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.48-60, 1997. ,
DOI : 10.1145/283699.283739
CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment, 2008 Sixth Annual Conference on Privacy, Security and Trust, pp.1-8, 2008. ,
DOI : 10.1109/PST.2008.19
Combined Resource and Context Model for QoS-Aware Mobile Middleware, Proceedings of 19th International Conference on Architecture of Computing Systems, pp.84-98, 2006. ,
DOI : 10.1007/11682127_7
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
Verifying continuous time Markov chains, Proc. 8th International Conference on Computer Aided Verification (CAV'96), volume 1102 of LNCS, pp.269-276, 1996. ,
DOI : 10.1007/3-540-61474-5_75
Approximate symbolic model checking of continuoustime Markov chains, Proc. 10th International Conference on Concurrency Theory (CONCUR'99), volume 1664 of LNCS, pp.146-161, 1999. ,
Toward open-world software: issues and challenges, Computer, issue.10, p.39, 2006. ,
A Formal Definition for ObjectRelational Database Metrics, Proceedings of the 7th International Conference on Enterprise Information System, 2005. ,
COCOA: COnversation-based service COmposition in pervAsive computing environments with QoS support, Journal of Systems and Software, vol.80, issue.12, pp.1941-1955, 2007. ,
DOI : 10.1016/j.jss.2007.03.002
URL : https://hal.archives-ouvertes.fr/inria-00415927
Automated Refinement of Dependability Analysis through Monitoring in Dynamically Connected Systems, 2011 Tenth International Symposium on Autonomous Decentralized Systems, 2011. ,
DOI : 10.1109/ISADS.2011.46
URL : https://hal.archives-ouvertes.fr/inria-00573405
GLIMPSE, Proceedings of the 13th European Workshop on Dependable Computing, EWDC '11, pp.2010-2034, 2010. ,
DOI : 10.1145/1978582.1978598
URL : https://hal.archives-ouvertes.fr/hal-00647355
Qos metrics in dynamic, evolving and heterogeneous connected systems, 8th International Workshop On Dynamic Analysis, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00536748
Model checking of probabilistic and nondeterministic systems, Proc. FSTTCS'95, 1995. ,
DOI : 10.1007/3-540-60692-0_70
Semirings for Soft Constraint Solving and Programming, LNCS, vol.2962, 2004. ,
DOI : 10.1007/b95712
Semiring-based constraint satisfaction and optimization, Journal of the ACM, vol.44, issue.2, pp.201-236, 1997. ,
DOI : 10.1145/256303.256306
An integration of reputation-based and policybased trust management, Semantic Web Policy Workshop, 2005. ,
Toward efficient algorithms for generating compact Petri nets from labeled transition systems, Proceedings 26th Annual International Computer Software and Applications, pp.717-722, 2002. ,
DOI : 10.1109/CMPSAC.2002.1045086
Using quantitative analysis to implement autonomic IT systems, 2009 IEEE 31st International Conference on Software Engineering, pp.100-110, 2009. ,
DOI : 10.1109/ICSE.2009.5070512
URL : https://hal.archives-ouvertes.fr/inria-00458053
Genet: A Tool for the Synthesis and Mining of Petri Nets, 2009 Ninth International Conference on Application of Concurrency to System Design, pp.181-185, 2009. ,
DOI : 10.1109/ACSD.2009.6
Enhancing Java ME Security Support with Resource Usage Monitoring, ICICS, pp.256-266, 2008. ,
DOI : 10.1145/359576.359585
TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006. ,
DOI : 10.1145/1133058.1133067
Reduction Techniques for Model Checking Markov Decision Processes, 2008 Fifth International Conference on Quantitative Evaluation of Systems, pp.45-54, 2008. ,
DOI : 10.1109/QEST.2008.45
The M ¨ obius modeling tool, 9th Int. Workshop on Petri Nets and Performance Models, pp.241-250, 2001. ,
Fine Grained Access Control with Trust and Reputation Management for Globus, OTM Conferences, pp.1505-1515, 2007. ,
DOI : 10.1007/978-3-540-76843-2_26
Deliverable 2.1 ? Capturing functional and non-functional connector behaviours, 2010. ,
Deliverable 3.1 ? Modeling of Application-and Middleware-layer Interaction Protocols, 2010. ,
Deliverable 5.1 ? Conceptual Models for Assessment & Assurance of Dependability, Security and Privacy in the Eternal CONNECTed World, 2010. ,
Deriving Petri nets from finite transition systems, IEEE Transactions on Computers, vol.47, issue.8, pp.859-882, 1998. ,
DOI : 10.1109/12.707587
Extending Security-by-Contract with Quantitative Trust on Mobile Devices, 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp.75-91, 2010. ,
DOI : 10.1109/CISIS.2010.33
URL : https://hal.archives-ouvertes.fr/inria-00536705
Extending securityby-contract with quantitative trust on mobile devices, Proceeding of CISIS 2010 The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, pp.872-877 ,
Runtime monitoring for next generation java me platform. Computers & Security, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00458909
Enforcing private policy via security-by-contract. Identity and Privacy Management. Special issue of the journal UPGRADE, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00458882
The complexity of probabilistic verification, Journal of the ACM, vol.42, issue.4, 1995. ,
DOI : 10.1145/210332.210339
TESLA, Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, DEBS '10, pp.50-61, 2010. ,
DOI : 10.1145/1827418.1827427
Formal Verification of Probabilistic Systems, 1997. ,
Towards a meta-model for dependability cases, OMG 1st Software Assurance Workshop, 2007. ,
Dependability analysis and verification for connected systems, Proc. ISOLA 2010 -Leveraging Applications of Formal Methods, Verification, and Validation, pp.263-277, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00534202
Partial (set) 2-structures, Acta Informatica, vol.27, issue.4, pp.315-342, 1990. ,
DOI : 10.1007/BF00264611
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
Rete: A fast algorithm for the many pattern/many object pattern match problem, Artificial Intelligence, vol.19, issue.1, pp.17-37, 1982. ,
DOI : 10.1016/0004-3702(82)90020-0
Quality-of-service specification in distributed object systems, Distributed Systems Engineering, vol.5, issue.4, pp.179-202, 1998. ,
DOI : 10.1088/0967-1846/5/4/005
A specification of the Agent Reputation and Trust (ART) testbed, Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems , AAMAS '05, pp.512-518, 2005. ,
DOI : 10.1145/1082473.1082551
URL : https://hal.archives-ouvertes.fr/hal-00405547
A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, vol.3, issue.4, pp.2-16, 2009. ,
DOI : 10.1109/COMST.2000.5340804
A modular approach for analyzing static and dynamic fault trees, Annual Reliability and Maintainability Symposium, pp.57-63, 1997. ,
DOI : 10.1109/RAMS.1997.571665
A logic for reasoning about time and reliability, Formal Aspects of Computing, vol.2, issue.1, pp.512-535, 1994. ,
DOI : 10.1007/BF01211866
An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment, 31st Annual International Computer Software and Applications Conference, Vol. 1- (COMPSAC 2007), 2007. ,
DOI : 10.1109/COMPSAC.2007.69
PRISM: A Tool for Automatic Verification of Probabilistic Systems, Proc. TACAS'06, 2006. ,
DOI : 10.1007/11691372_29
Analysing Dependability Case Arguments Using Quality Models, Proceedings of 28th International Conference on Computer Safety, Reliability, and Security, pp.118-131, 2009. ,
DOI : 10.1109/MC.2008.37
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
Semantic constraints for trust transitivity, APCCM: 2nd Asia-Pacific conference on Conceptual modelling, pp.59-68, 2005. ,
The beta reputation system, Proceedings of the 15th Bled Electronic Commerce Conference, pp.17-19, 2002. ,
Engineering Autonomous Trust-Management Requirements for Software Agents: Requirements and Concepts, Innovations and Advances in Computer Sciences and Engineering, pp.483-489, 2010. ,
DOI : 10.1007/978-90-481-3658-2_85
Referral Web: combining social networks and collaborative filtering, Communications of the ACM, vol.40, issue.3, pp.63-65, 1997. ,
DOI : 10.1145/245108.245123
Formal verification of parallel programs, Communications of the ACM, vol.19, issue.7, pp.371-384, 1976. ,
DOI : 10.1145/360248.360251
Arguing Safety -A Systematic Approach to Managing Safety Cases, 1998. ,
Trust Type Based Semantic Web Services Assessment and Selection, 2008 10th International Conference on Advanced Communication Technology, pp.2048-2053, 2008. ,
DOI : 10.1109/ICACT.2008.4494190
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication, Journal of Network and Systems Management, vol.6, issue.1, pp.117-136, 2007. ,
DOI : 10.1007/s10922-006-9057-2
DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'., p.2, 1995. ,
DOI : 10.1109/FTCSH.1995.532603
Eclipse Modeling Framework Tutorial, 2011. ,
On the self-similar nature of Ethernet traffic (extended version), IEEE/ACM Transactions on Networking, vol.2, issue.1, pp.1-15, 1994. ,
DOI : 10.1109/90.282603
Design of a role-based trust-management framework, SP '02: Proc. of Security and Privacy, p.114, 2002. ,
A semantic end-to-end QoS model for dynamic service oriented environments, 2009 ICSE Workshop on Principles of Engineering Service Oriented Systems, pp.34-41, 2009. ,
DOI : 10.1109/PESOS.2009.5068817
URL : https://hal.archives-ouvertes.fr/inria-00468220
Concurrency: state models & Java programs, 2006. ,
Gem -a generalised event monitoring language for distributed systems, IEE/IOPBCS Distributed Systems Engineering Journal, vol.4, 1997. ,
Formalising Trust as a Computational Concept, 1994. ,
Towards Automated Dependability Analysis of Dynamically Connected Systems, 2011 Tenth International Symposium on Autonomous Decentralized Systems, 2011. ,
DOI : 10.1109/ISADS.2011.23
URL : https://hal.archives-ouvertes.fr/inria-00573410
Applications of abduction: knowledge-level modelling, International Journal of Human-Computer Studies, vol.45, issue.3, pp.305-335, 1996. ,
DOI : 10.1006/ijhc.1996.0054
Model-driven generative development of measurement software, Software and Systems Modeling (SoSyM), tba, 2010. ,
DOI : 10.1007/s10270-010-0165-9
URL : https://hal.archives-ouvertes.fr/inria-00504670
Performability modeling with stochastic activity networks, Real-Time Systems Symposium, pp.215-224, 1984. ,
Ratings in distributed systems: A bayesian approach, Proceedings of the Workshop on Information Technologies and Systems (WITS), pp.1-7, 2001. ,
A Bayesian framework for online reputation systems, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), pp.121-121, 2006. ,
DOI : 10.1109/AICT-ICIW.2006.2
Profile for Modeling and Analysis of Real-Time and Embedded systems (MARTE) ,
Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms Specification, Version 1.1. http://www.omg.org/spec, 2008. ,
Integrating Behavioral Trust in Web Service Compositions, 2009 IEEE International Conference on Web Services, pp.453-460, 2009. ,
DOI : 10.1109/ICWS.2009.106
Towards unified dependability modeling and analysis, Proceedings of ARCS Workshops, pp.113-122, 2004. ,
The temporal logic of programs, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.46-57, 1977. ,
DOI : 10.1109/SFCS.1977.32
Markov Decision Processes: Discrete Stochastic Dynamic Programming, 1994. ,
DOI : 10.1002/9780470316887
TRULLO - local trust bootstrapping for ubiquitous devices, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous), 2007. ,
DOI : 10.1109/MOBIQ.2007.4451015
LearnLib, Proceedings of the 10th international workshop on Formal methods for industrial critical systems , FMICS '05, pp.62-71, 2005. ,
DOI : 10.1145/1081180.1081189
URL : https://hal.archives-ouvertes.fr/inria-00459959
Supporting trust in virtual communities, IEEE Hawaii International Conference on System Sciences, p.6007, 2000. ,
Towards a model for object-oriented design measurement, Proceedings of ECOOP Workshop on Quantative Approaches in Object-Oriented Software Engineering, pp.71-84, 2001. ,
Establishing Trust Beliefs Based on a Uniform Disposition to Trust, 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2010. ,
DOI : 10.1109/SITIS.2007.54
Mediating Connector Patterns for Components Interoperability, Proceedings of the European Conference on Software Architecture (ECSA2010), 2010. ,
DOI : 10.1007/11678564_12
URL : https://hal.archives-ouvertes.fr/inria-00512435
PACE: an architectural style for trust management in decentralized applications, Proceedings. Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA 2004), pp.221-230, 2004. ,
DOI : 10.1109/WICSA.2004.1310705
SIFT: A Simulation Framework for Analyzing Decentralized Reputation-based Trust Models, 2007. ,
The QoS-MO ontology for semantic QoS modeling, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.2336-2340, 2008. ,
DOI : 10.1145/1363686.1364239
An experience on reputation models interoperability based on a functional ontology, Proceedings of 20th International Joint Conference on Artificial Intelligence (IJCAI'07), 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00405579
Semantic Markup for Web Services, 2004. ,
Mediators in the architecture of future information systems, Computer, vol.25, issue.3, pp.38-49, 2002. ,
DOI : 10.1109/2.121508
Gossiptrust for fast reputation aggregation in peer-to-peer networks, IEEE Transactions on Knowledge and Data Engineering, pp.1282-1295, 2008. ,
The official PGP user's guide, CONNECT, vol.231167, p.123123, 1995. ,