Protecting free expression online with Freenet, IEEE Internet Computing, vol.6, issue.1, pp.40-49, 2002. ,
DOI : 10.1109/4236.978368
Friend-to-Friend Computing: Building the Social Web at the Internet Edges, 2009. ,
Audit-based Compliance Control, Information Security, vol.9, issue.1, pp.37-49, 2007. ,
A logical framework for history-based access control and reputation systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008. ,
DOI : 10.3233/JCS-2008-16102
Taxonomy of Trust: Categorizing P2P Reputation Systems. Working Paper, 2005. ,
A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002. ,
DOI : 10.1109/HICSS.2002.994181
Friend-to-Friend Computing - Instant Messaging Based Spontaneous Desktop Grid, 2008 Third International Conference on Internet and Web Applications and Services, pp.245-256, 2008. ,
DOI : 10.1109/ICIW.2008.87
Log auditing through model-checking, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930148
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9868
Cooperative peer groups in NICE, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.523-544, 2006. ,
DOI : 10.1109/INFCOM.2003.1208963
A new dimension in access control, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.196-205, 2002. ,
DOI : 10.1145/587078.587106