PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.46-52, 2009. ,
DOI : 10.1145/1578002.1578010
Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007. ,
DOI : 10.1007/s10207-007-0017-y
URL : http://doc.utwente.nl/67014/1/Cederquist07audit.pdf
On Obligations, Proceedings of the 10th European Symposium on Research in Computer Security, ESORICS 2005, pp.98-117, 2005. ,
DOI : 10.1007/11555827_7
Protecting Data Privacy in Structured P2P Networks, Proceedings of the 2nd International Conference on Data Management in Grid and Peer-to-Peer Systems, pp.85-98, 2009. ,
DOI : 10.1007/3-540-45518-3_18
URL : https://hal.archives-ouvertes.fr/inria-00414050
The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003. ,
DOI : 10.1145/775152.775242
A logical framework for history-based access control and reputation systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008. ,
DOI : 10.3233/JCS-2008-16102
A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002. ,
DOI : 10.1109/HICSS.2002.994181
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004. ,
DOI : 10.1145/984334.984339
Flexible Update Propagation for Weakly Consistent Replication, Proceedings of the 16th ACM Symposium on Operating Systems Principles -SOSP'97, pp.288-301, 1997. ,
Peer-to-peer systems, Communications of the ACM, vol.53, issue.10, pp.72-82, 2010. ,
DOI : 10.1145/1831407.1831427
Log auditing through model-checking, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.220-234, 2001. ,
DOI : 10.1109/CSFW.2001.930148
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9868
Cooperative peer groups in NICE, Computer Networks, vol.50, issue.4, pp.523-544, 2006. ,
DOI : 10.1016/j.comnet.2005.07.012
A new dimension in access control, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.196-205, 2002. ,
DOI : 10.1145/587078.587106
Logoot-Undo: Distributed Collaborative Editing System on P2P Networks, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1162-1174, 2010. ,
DOI : 10.1109/TPDS.2009.173
URL : https://hal.archives-ouvertes.fr/hal-00450416
OverSoc: Social Profile Based Overlays, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, pp.205-210, 2010. ,
DOI : 10.1109/WETICE.2010.39