R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, Proceedings of the 28th International Conference on Very Large Data Bases, VLDB 2002, pp.143-154, 2002.
DOI : 10.1016/B978-155860869-6/50021-4

J. G. Cederquist, R. Corin, M. A. Dekker, S. Etalle, J. I. Hartog et al., Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007.
DOI : 10.1007/s10207-007-0017-y

A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson et al., Epidemic Algorithms for Replicated Database Maintenance, Proceedings of the Sixth annual ACM Symposium on Principles of Distributed Computing, PODC'87, pp.1-12, 1987.

P. Dewan and H. Shen, Controlling access in multiuser interfaces, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.37-62, 1998.
DOI : 10.1145/274444.274446

S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian, Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001.
DOI : 10.1145/383891.383894

S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003.
DOI : 10.1145/775152.775242

K. Krukow, M. Nielsen, and V. Sassone, A logical framework for history-based access control and reputation systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008.
DOI : 10.3233/JCS-2008-16102

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978.
DOI : 10.1145/359545.359563

J. Loeliger, Collaborating with Git. Linux Magazine, 2006.

S. Marti and H. Garcia-molina, Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, pp.472-484, 2006.
DOI : 10.1016/j.comnet.2005.07.011

F. Mattern, Virtual Time and Global States of Distributed Systems, Proceedings of the International Workshop on Parallel and Distributed Algorithms, pp.215-226, 1989.

A. Montresor and M. Jelasity, PeerSim: A scalable P2P simulator, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.99-100, 2009.
DOI : 10.1109/P2P.2009.5284506

L. Mui, M. Mohtashemi, and A. Halberstadt, A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002.
DOI : 10.1109/HICSS.2002.994181

B. O. Sullivan, Mercurial: The Definitive Guide. O'Reilly Media, 2009.

G. J. Pace and G. Schneider, Challenges in the Specification of Full Contracts, Proceedings of the 7th International Conference on Integrated Formal Methods, IFM 2009, pp.292-306, 2009.
DOI : 10.1007/11786849_21

R. Prakash, M. Raynal, and M. Singhal, An Adaptive Causal Ordering Algorithm Suited to Mobile Computing Environments, Journal of Parallel and Distributed Computing, vol.41, issue.2, pp.190-204, 1997.
DOI : 10.1006/jpdc.1996.1300

M. Roger and J. Goubault-larrecq, Log auditing through model-checking, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.220-234, 2001.
DOI : 10.1109/CSFW.2001.930148

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9868

R. Sherwood, S. Lee, and B. Bhattacharjee, Cooperative peer groups in NICE, Computer Networks, vol.50, issue.4, pp.523-544, 2006.
DOI : 10.1016/j.comnet.2005.07.012

G. Stevens and V. Wulf, A new dimension in access control, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.196-205, 2002.
DOI : 10.1145/587078.587106

C. Sun, X. Jia, Y. Zhang, Y. Yang, and D. Chen, Achieving convergence, causality preservation, and intention preservation in real-time cooperative editing systems, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.63-108, 1998.
DOI : 10.1145/274444.274447

H. T. Truong and C. Ignat, Log Auditing for Trust Assessment in Peer-to-Peer Collaboration, 2011 10th International Symposium on Parallel and Distributed Computing, 2011.
DOI : 10.1109/ISPDC.2011.38

URL : https://hal.archives-ouvertes.fr/inria-00636177

S. Weiss, P. Urso, and P. Molli, Logoot-Undo: Distributed Collaborative Editing System on P2P Networks, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1162-1174, 2010.
DOI : 10.1109/TPDS.2009.173

URL : https://hal.archives-ouvertes.fr/hal-00450416

T. Wobber, T. L. Rodeheffer, and D. B. Terry, Policy-based access control for weakly consistent replication, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.293-306, 2010.
DOI : 10.1145/1755913.1755943

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3281