A. Abdul-rahman and S. Hailes, A distributed trust model, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.48-60, 1997.
DOI : 10.1145/283699.283739

S. Ahamed, M. Monjur, and M. Islam, CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment, 2008 Sixth Annual Conference on Privacy, Security and Trust, pp.1-8, 2008.
DOI : 10.1109/PST.2008.19

S. Amundsen and F. Eliassen, Combined Resource and Context Model for QoS-Aware Mobile Middleware, Proceedings of 19th International Conference on Architecture of Computing Systems, pp.84-98, 2006.
DOI : 10.1007/11682127_7

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

A. Aziz, K. Sanwal, V. Singhal, and R. Brayton, Verifying continuous time Markov chains, Proc. 8th International Conference on Computer Aided Verification (CAV'96), volume 1102 of LNCS, pp.269-276, 1996.
DOI : 10.1007/3-540-61474-5_75

C. Baier, J. Katoen, and H. Hermanns, Approximate symbolic model checking of continuoustime Markov chains, Proc. 10th International Conference on Concurrency Theory (CONCUR'99), volume 1664 of LNCS, pp.146-161, 1999.

L. Baresi, C. Ghezzi, and E. D. Nitto, Toward open-world software: issues and challenges, Computer, issue.10, p.39, 2006.

A. L. Baroni, C. Calero, M. Piattini, and O. B. Abreu, A Formal Definition for ObjectRelational Database Metrics, Proceedings of the 7th International Conference on Enterprise Information System, 2005.

S. B. Mokhtar, N. Georgantas, and V. Issarny, COCOA: COnversation-based service COmposition in pervAsive computing environments with QoS support, Journal of Systems and Software, vol.80, issue.12, pp.1941-1955, 2007.
DOI : 10.1016/j.jss.2007.03.002

URL : https://hal.archives-ouvertes.fr/inria-00415927

A. Bertolino, A. Calabròcalabr-`-calabrò, F. Di-giandomenico, M. Martinucci, and P. Masci, Automated Refinement of Dependability Analysis through Monitoring in Dynamically Connected Systems, 2011 Tenth International Symposium on Autonomous Decentralized Systems, 2011.
DOI : 10.1109/ISADS.2011.46

URL : https://hal.archives-ouvertes.fr/inria-00573405

A. Bertolino, A. Calabròcalabr-`-calabrò, F. Lonetti, and A. Sabetta, GLIMPSE, Proceedings of the 13th European Workshop on Dependable Computing, EWDC '11, pp.2010-2034, 2010.
DOI : 10.1145/1978582.1978598

URL : https://hal.archives-ouvertes.fr/hal-00647355

A. Bertolino, F. D. Giandomenico, A. D. Marco, P. M. Masci, and A. Sabetta, Qos metrics in dynamic, evolving and heterogeneous connected systems, 8th International Workshop On Dynamic Analysis, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00536748

A. Bianco and L. De-alfaro, Model checking of probabilistic and nondeterministic systems, Proc. FSTTCS'95, 1995.
DOI : 10.1007/3-540-60692-0_70

S. Bistarelli, Semirings for Soft Constraint Solving and Programming, LNCS, vol.2962, 2004.
DOI : 10.1007/b95712

S. Bistarelli, U. Montanari, and F. Rossi, Semiring-based constraint satisfaction and optimization, Journal of the ACM, vol.44, issue.2, pp.201-236, 1997.
DOI : 10.1145/256303.256306

P. Bonatti, C. Duma, D. Olmedilla, and N. Shahmehri, An integration of reputation-based and policybased trust management, Semantic Web Policy Workshop, 2005.

U. Buy and G. Singal, Toward efficient algorithms for generating compact Petri nets from labeled transition systems, Proceedings 26th Annual International Computer Software and Applications, pp.717-722, 2002.
DOI : 10.1109/CMPSAC.2002.1045086

R. Calinescu and M. Kwiatkowska, Using quantitative analysis to implement autonomic IT systems, 2009 IEEE 31st International Conference on Software Engineering, pp.100-110, 2009.
DOI : 10.1109/ICSE.2009.5070512

URL : https://hal.archives-ouvertes.fr/inria-00458053

J. Carmona, J. Cortadella, and M. Kishinevsky, Genet: A Tool for the Synthesis and Mining of Petri Nets, 2009 Ninth International Conference on Application of Concurrency to System Design, pp.181-185, 2009.
DOI : 10.1109/ACSD.2009.6

A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, Enhancing Java ME Security Support with Resource Usage Monitoring, ICICS, pp.256-266, 2008.
DOI : 10.1145/359576.359585

S. Chakraborty and I. Ray, TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006.
DOI : 10.1145/1133058.1133067

F. Ciesinski, C. Baier, M. Größergr¨größer, and J. Klein, Reduction Techniques for Model Checking Markov Decision Processes, 2008 Fifth International Conference on Quantitative Evaluation of Systems, pp.45-54, 2008.
DOI : 10.1109/QEST.2008.45

G. Clark, T. Courtney, D. Daly, D. D. Deavours, S. Derisavi et al., The M ¨ obius modeling tool, 9th Int. Workshop on Petri Nets and Performance Models, pp.241-250, 2001.

M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli, Fine Grained Access Control with Trust and Reputation Management for Globus, OTM Conferences, pp.1505-1515, 2007.
DOI : 10.1007/978-3-540-76843-2_26

C. Consortium, Deliverable 2.1 ? Capturing functional and non-functional connector behaviours, 2010.

C. Consortium, Deliverable 3.1 ? Modeling of Application-and Middleware-layer Interaction Protocols, 2010.

C. Consortium, Deliverable 5.1 ? Conceptual Models for Assessment & Assurance of Dependability, Security and Privacy in the Eternal CONNECTed World, 2010.

J. Cortadella, M. Kishinevsky, L. Lavagno, and A. Yakovlev, Deriving Petri nets from finite transition systems, IEEE Transactions on Computers, vol.47, issue.8, pp.859-882, 1998.
DOI : 10.1109/12.707587

G. Costa, N. Dragoni, V. Issarny, A. Lazouski, F. Martinelli et al., Extending Security-by-Contract with Quantitative Trust on Mobile Devices, 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp.75-91, 2010.
DOI : 10.1109/CISIS.2010.33

URL : https://hal.archives-ouvertes.fr/inria-00536705

G. Costa, N. Dragoni, A. Lazouski, F. Martinelli, F. Massacci et al., Extending securityby-contract with quantitative trust on mobile devices, Proceeding of CISIS 2010 The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, pp.872-877

G. Costa, F. Martinelli, P. Mori, C. Schaefer, and T. Walter, Runtime monitoring for next generation java me platform. Computers & Security, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00458909

G. Costa and I. Matteucci, Enforcing private policy via security-by-contract. Identity and Privacy Management. Special issue of the journal UPGRADE, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00458882

C. Courcoubetis and M. Yannakakis, The complexity of probabilistic verification, Journal of the ACM, vol.42, issue.4, 1995.
DOI : 10.1145/210332.210339

G. Cugola and A. Margara, TESLA, Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, DEBS '10, pp.50-61, 2010.
DOI : 10.1145/1827418.1827427

L. De-alfaro, Formal Verification of Probabilistic Systems, 1997.

G. Despotou, D. S. Kolovos, R. F. Paige, F. A. Polack, and T. P. Kelly, Towards a meta-model for dependability cases, OMG 1st Software Assurance Workshop, 2007.

F. , D. Giandomenico, M. Kwiatkowska, M. Martinucci, P. Masci et al., Dependability analysis and verification for connected systems, Proc. ISOLA 2010 -Leveraging Applications of Formal Methods, Verification, and Validation, pp.263-277, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00534202

A. Ehrenfeucht and G. Rozenberg, Partial (set) 2-structures, Acta Informatica, vol.27, issue.4, pp.315-342, 1990.
DOI : 10.1007/BF00264611

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

C. Forgy, Rete: A fast algorithm for the many pattern/many object pattern match problem, Artificial Intelligence, vol.19, issue.1, pp.17-37, 1982.
DOI : 10.1016/0004-3702(82)90020-0

S. Frolund and J. Koistinen, Quality-of-service specification in distributed object systems, Distributed Systems Engineering, vol.5, issue.4, pp.179-202, 1998.
DOI : 10.1088/0967-1846/5/4/005

K. Fullam, T. Klos, G. Muller, J. Sabater, A. Schlosser et al., A specification of the Agent Reputation and Trust (ART) testbed, Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems , AAMAS '05, pp.512-518, 2005.
DOI : 10.1145/1082473.1082551

URL : https://hal.archives-ouvertes.fr/hal-00405547

T. Grandison and M. Sloman, A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, vol.3, issue.4, pp.2-16, 2009.
DOI : 10.1109/COMST.2000.5340804

R. Gulati and J. B. Dugan, A modular approach for analyzing static and dynamic fault trees, Annual Reliability and Maintainability Symposium, pp.57-63, 1997.
DOI : 10.1109/RAMS.1997.571665

H. Hansson and B. Jonsson, A logic for reasoning about time and reliability, Formal Aspects of Computing, vol.2, issue.1, pp.512-535, 1994.
DOI : 10.1007/BF01211866

M. Haque and S. Ahamed, An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment, 31st Annual International Computer Software and Applications Conference, Vol. 1- (COMPSAC 2007), 2007.
DOI : 10.1109/COMPSAC.2007.69

A. Hinton, M. Kwiatkowska, G. Norman, and D. Parker, PRISM: A Tool for Automatic Verification of Probabilistic Systems, Proc. TACAS'06, 2006.
DOI : 10.1007/11691372_29

M. Huhn and A. Zechner, Analysing Dependability Case Arguments Using Quality Models, Proceedings of 28th International Conference on Computer Safety, Reliability, and Security, pp.118-131, 2009.
DOI : 10.1109/MC.2008.37

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

A. Jøsang and S. Pope, Semantic constraints for trust transitivity, APCCM: 2nd Asia-Pacific conference on Conceptual modelling, pp.59-68, 2005.

A. Jsang and R. Ismail, The beta reputation system, Proceedings of the 15th Bled Electronic Commerce Conference, pp.17-19, 2002.

S. Kaffille and G. Wirtz, Engineering Autonomous Trust-Management Requirements for Software Agents: Requirements and Concepts, Innovations and Advances in Computer Sciences and Engineering, pp.483-489, 2010.
DOI : 10.1007/978-90-481-3658-2_85

H. Kautz, B. Selman, and M. Shah, Referral Web: combining social networks and collaborative filtering, Communications of the ACM, vol.40, issue.3, pp.63-65, 1997.
DOI : 10.1145/245108.245123

R. Keller, Formal verification of parallel programs, Communications of the ACM, vol.19, issue.7, pp.371-384, 1976.
DOI : 10.1145/360248.360251

T. P. Kelly, Arguing Safety -A Systematic Approach to Managing Safety Cases, 1998.

Y. Kim and K. Doh, Trust Type Based Semantic Web Services Assessment and Selection, 2008 10th International Conference on Advanced Communication Technology, pp.2048-2053, 2008.
DOI : 10.1109/ICACT.2008.4494190

H. Koshutanski and F. Massacci, A Negotiation Scheme for Access Rights Establishment in Autonomic Communication, Journal of Network and Systems Management, vol.6, issue.1, pp.117-136, 2007.
DOI : 10.1007/s10922-006-9057-2

J. Laprie, DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'., p.2, 1995.
DOI : 10.1109/FTCSH.1995.532603

L. Vogel, Eclipse Modeling Framework Tutorial, 2011.

W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, On the self-similar nature of Ethernet traffic (extended version), IEEE/ACM Transactions on Networking, vol.2, issue.1, pp.1-15, 1994.
DOI : 10.1109/90.282603

N. Li, J. C. Mitchell, and W. H. Winsborough, Design of a role-based trust-management framework, SP '02: Proc. of Security and Privacy, p.114, 2002.

N. B. Mabrouk, N. Georgantas, and V. Issarny, A semantic end-to-end QoS model for dynamic service oriented environments, 2009 ICSE Workshop on Principles of Engineering Service Oriented Systems, pp.34-41, 2009.
DOI : 10.1109/PESOS.2009.5068817

URL : https://hal.archives-ouvertes.fr/inria-00468220

J. Magee and J. Kramer, Concurrency: state models & Java programs, 2006.

M. Mansouri-samani and M. Sloman, Gem -a generalised event monitoring language for distributed systems, IEE/IOPBCS Distributed Systems Engineering Journal, vol.4, 1997.

S. Marsh, Formalising Trust as a Computational Concept, 1994.

P. Masci, M. Martinucci, and F. D. Giandomenico, Towards Automated Dependability Analysis of Dynamically Connected Systems, 2011 Tenth International Symposium on Autonomous Decentralized Systems, 2011.
DOI : 10.1109/ISADS.2011.23

URL : https://hal.archives-ouvertes.fr/inria-00573410

T. Menzies, Applications of abduction: knowledge-level modelling, International Journal of Human-Computer Studies, vol.45, issue.3, pp.305-335, 1996.
DOI : 10.1006/ijhc.1996.0054

M. Monperrus, J. J. ´-ezéquelez´ezéquel, B. Baudry, J. Champeau, and B. Hoeltzener, Model-driven generative development of measurement software, Software and Systems Modeling (SoSyM), tba, 2010.
DOI : 10.1007/s10270-010-0165-9

URL : https://hal.archives-ouvertes.fr/inria-00504670

A. Movaghar and J. F. Meyer, Performability modeling with stochastic activity networks, Real-Time Systems Symposium, pp.215-224, 1984.

L. Mui, M. Mohtashemi, C. Ang, P. Szolovits, and A. Halberstadt, Ratings in distributed systems: A bayesian approach, Proceedings of the Workshop on Information Technologies and Systems (WITS), pp.1-7, 2001.

P. Nurmi, A Bayesian framework for online reputation systems, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), pp.121-121, 2006.
DOI : 10.1109/AICT-ICIW.2006.2

O. Uml, Profile for Modeling and Analysis of Real-Time and Embedded systems (MARTE)

O. Uml, Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms Specification, Version 1.1. http://www.omg.org/spec, 2008.

S. Paradesi, P. Doshi, and S. Swaika, Integrating Behavioral Trust in Web Service Compositions, 2009 IEEE International Conference on Web Services, pp.453-460, 2009.
DOI : 10.1109/ICWS.2009.106

A. Pataricza and F. György¨györ, Towards unified dependability modeling and analysis, Proceedings of ARCS Workshops, pp.113-122, 2004.

A. Pnueli, The temporal logic of programs, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.46-57, 1977.
DOI : 10.1109/SFCS.1977.32

M. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming, 1994.
DOI : 10.1002/9780470316887

D. Quercia, S. Hailes, and L. Capra, TRULLO - local trust bootstrapping for ubiquitous devices, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous), 2007.
DOI : 10.1109/MOBIQ.2007.4451015

H. Raffelt, B. Steffen, and T. Berg, LearnLib, Proceedings of the 10th international workshop on Formal methods for industrial critical systems , FMICS '05, pp.62-71, 2005.
DOI : 10.1145/1081180.1081189

URL : https://hal.archives-ouvertes.fr/inria-00459959

A. Rahman and S. Hailes, Supporting trust in virtual communities, IEEE Hawaii International Conference on System Sciences, p.6007, 2000.

R. Reibing, Towards a model for object-oriented design measurement, Proceedings of ECOOP Workshop on Quantative Approaches in Object-Oriented Software Engineering, pp.71-84, 2001.

R. Saadi, J. M. Pierson, and L. Brunie, Establishing Trust Beliefs Based on a Uniform Disposition to Trust, 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2010.
DOI : 10.1109/SITIS.2007.54

R. Spalazzese and P. Inverardi, Mediating Connector Patterns for Components Interoperability, Proceedings of the European Conference on Software Architecture (ECSA2010), 2010.
DOI : 10.1007/11678564_12

URL : https://hal.archives-ouvertes.fr/inria-00512435

G. Suryanarayana, J. Erenkrantz, S. Hendrickson, and R. Taylor, PACE: an architectural style for trust management in decentralized applications, Proceedings. Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA 2004), pp.221-230, 2004.
DOI : 10.1109/WICSA.2004.1310705

G. Suryanarayana and R. Taylor, SIFT: A Simulation Framework for Analyzing Decentralized Reputation-based Trust Models, 2007.

G. F. Tondello and F. Siqueira, The QoS-MO ontology for semantic QoS modeling, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.2336-2340, 2008.
DOI : 10.1145/1363686.1364239

L. Vercouter, S. Casare, J. Sichman, and A. Brandao, An experience on reputation models interoperability based on a functional ontology, Proceedings of 20th International Joint Conference on Artificial Intelligence (IJCAI'07), 2007.
URL : https://hal.archives-ouvertes.fr/hal-00405579

W. Owl-s, Semantic Markup for Web Services, 2004.

G. Wiederhold, Mediators in the architecture of future information systems, Computer, vol.25, issue.3, pp.38-49, 2002.
DOI : 10.1109/2.121508

R. Zhou, K. Hwang, and M. Cai, Gossiptrust for fast reputation aggregation in peer-to-peer networks, IEEE Transactions on Knowledge and Data Engineering, pp.1282-1295, 2008.

P. R. Zimmermann, The official PGP user's guide, CONNECT, vol.231167, p.123123, 1995.