S. Buchegger, D. Schiöberg, L. H. Vu, and A. Datta, PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.46-52, 2009.
DOI : 10.1145/1578002.1578010

J. G. Cederquist, R. Corin, M. A. Dekker, S. Etalle, J. I. Hartog et al., Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007.
DOI : 10.1007/s10207-007-0017-y

URL : http://doc.utwente.nl/67014/1/Cederquist07audit.pdf

M. Hilty, D. A. Basin, and A. Pretschner, On Obligations, Proceedings of the 10th European Symposium on Research in Computer Security, ESORICS 2005, pp.98-117, 2005.
DOI : 10.1007/11555827_7

M. Jawad, P. Serrano-alvarado, and P. Valduriez, Protecting Data Privacy in Structured P2P Networks, Proceedings of the 2nd International Conference on Data Management in Grid and Peer-to-Peer Systems, pp.85-98, 2009.
DOI : 10.1007/3-540-45518-3_18

URL : https://hal.archives-ouvertes.fr/inria-00414050

S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003.
DOI : 10.1145/775152.775242

K. Krukow, M. Nielsen, and V. Sassone, A logical framework for history-based access control and reputation systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008.
DOI : 10.3233/JCS-2008-16102

L. Mui, M. Mohtashemi, and A. Halberstadt, A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002.
DOI : 10.1109/HICSS.2002.994181

J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

K. Petersen, M. J. Spreitzer, D. B. Terry, M. M. Theimer, and A. J. Demers, Flexible Update Propagation for Weakly Consistent Replication, Proceedings of the 16th ACM Symposium on Operating Systems Principles -SOSP'97, pp.288-301, 1997.

R. Rodrigues and P. Druschel, Peer-to-peer systems, Communications of the ACM, vol.53, issue.10, pp.72-82, 2010.
DOI : 10.1145/1831407.1831427

M. Roger and J. Goubault-larrecq, Log auditing through model-checking, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.220-234, 2001.
DOI : 10.1109/CSFW.2001.930148

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Sherwood, S. Lee, and B. Bhattacharjee, Cooperative peer groups in NICE, Computer Networks, vol.50, issue.4, pp.523-544, 2006.
DOI : 10.1016/j.comnet.2005.07.012

G. Stevens and V. Wulf, A new dimension in access control, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.196-205, 2002.
DOI : 10.1145/587078.587106

S. Weiss, P. Urso, and P. Molli, Logoot-Undo: Distributed Collaborative Editing System on P2P Networks, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1162-1174, 2010.
DOI : 10.1109/TPDS.2009.173

URL : https://hal.archives-ouvertes.fr/hal-00450416

D. I. Wolinsky, P. S. Juste, P. O. Boykin, and R. Figueiredo, OverSoc: Social Profile Based Overlays, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, pp.205-210, 2010.
DOI : 10.1109/WETICE.2010.39