I. Clarke, S. G. Miller, T. W. Hong, O. Sandberg, and B. Wiley, Protecting free expression online with Freenet, IEEE Internet Computing, vol.6, issue.1, pp.40-49, 2002.
DOI : 10.1109/4236.978368

W. Galuba, Friend-to-Friend Computing: Building the Social Web at the Internet Edges, 2009.

J. G. Cerderquist, R. Corin, M. A. Dekker, S. Etalle, J. Hartog et al., Audit-based Compliance Control, Information Security, vol.9, issue.1, pp.37-49, 2007.

K. Krukow, M. Nielsen, and V. Sassone, A logical framework for history-based access control and reputation systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008.
DOI : 10.3233/JCS-2008-16102

S. Marti and H. Garcia-molina, Taxonomy of Trust: Categorizing P2P Reputation Systems. Working Paper, 2005.

L. Mui and M. Mohtashemi, A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002.
DOI : 10.1109/HICSS.2002.994181

U. Norbisrath, K. Kraaner, E. Vainikko, and O. Batrasev, Friend-to-Friend Computing - Instant Messaging Based Spontaneous Desktop Grid, 2008 Third International Conference on Internet and Web Applications and Services, pp.245-256, 2008.
DOI : 10.1109/ICIW.2008.87

M. Roger and J. Goubault-larrecq, Log auditing through model-checking, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930148

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. B. Lee and R. Sherwood, Cooperative peer groups in NICE, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.523-544, 2006.
DOI : 10.1109/INFCOM.2003.1208963

G. Stevens and V. Wulf, A new dimension in access control, Proceedings of the 2002 ACM conference on Computer supported cooperative work , CSCW '02, pp.196-205, 2002.
DOI : 10.1145/587078.587106