Hippocratic Databases, Proceedings of the 28th International Conference on Very Large Data Bases, VLDB 2002, pp.143-154, 2002. ,
DOI : 10.1016/B978-155860869-6/50021-4
Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007. ,
DOI : 10.1007/s10207-007-0017-y
Epidemic Algorithms for Replicated Database Maintenance, Proceedings of the Sixth annual ACM Symposium on Principles of Distributed Computing, PODC'87, pp.1-12, 1987. ,
Controlling access in multiuser interfaces, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.37-62, 1998. ,
DOI : 10.1145/274444.274446
Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001. ,
DOI : 10.1145/383891.383894
The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003. ,
DOI : 10.1145/775152.775242
A logical framework for history-based access control and reputation systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008. ,
DOI : 10.3233/JCS-2008-16102
Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978. ,
DOI : 10.1145/359545.359563
Collaborating with Git. Linux Magazine, 2006. ,
Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, pp.472-484, 2006. ,
DOI : 10.1016/j.comnet.2005.07.011
Virtual Time and Global States of Distributed Systems, Proceedings of the International Workshop on Parallel and Distributed Algorithms, pp.215-226, 1989. ,
PeerSim: A scalable P2P simulator, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.99-100, 2009. ,
DOI : 10.1109/P2P.2009.5284506
A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002. ,
DOI : 10.1109/HICSS.2002.994181
Mercurial: The Definitive Guide. O'Reilly Media, 2009. ,
Challenges in the Specification of Full Contracts, Proceedings of the 7th International Conference on Integrated Formal Methods, IFM 2009, pp.292-306, 2009. ,
DOI : 10.1007/11786849_21
An Adaptive Causal Ordering Algorithm Suited to Mobile Computing Environments, Journal of Parallel and Distributed Computing, vol.41, issue.2, pp.190-204, 1997. ,
DOI : 10.1006/jpdc.1996.1300
Log auditing through model-checking, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.220-234, 2001. ,
DOI : 10.1109/CSFW.2001.930148
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9868
Cooperative peer groups in NICE, Computer Networks, vol.50, issue.4, pp.523-544, 2006. ,
DOI : 10.1016/j.comnet.2005.07.012
A new dimension in access control, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.196-205, 2002. ,
DOI : 10.1145/587078.587106
Achieving convergence, causality preservation, and intention preservation in real-time cooperative editing systems, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.63-108, 1998. ,
DOI : 10.1145/274444.274447
Log Auditing for Trust Assessment in Peer-to-Peer Collaboration, 2011 10th International Symposium on Parallel and Distributed Computing, 2011. ,
DOI : 10.1109/ISPDC.2011.38
URL : https://hal.archives-ouvertes.fr/inria-00636177
Logoot-Undo: Distributed Collaborative Editing System on P2P Networks, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1162-1174, 2010. ,
DOI : 10.1109/TPDS.2009.173
URL : https://hal.archives-ouvertes.fr/hal-00450416
Policy-based access control for weakly consistent replication, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.293-306, 2010. ,
DOI : 10.1145/1755913.1755943
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3281