
References
1. Guemara-El Fatmi, S., Boudriga, N., Obaidat, M.S.: Relational-based calculus for Trust
Management in network services. To appear in Computer Communication Journal (2004)
2. Asokan, N., Janson, P.A., Steiner, M., Waidner, M.: The state of the art in electronic payment
systems. IBM Zurich (1997)
3. Bellare, M., Garay, J., Herzberg, A., Krawczky, H., Steiner, M., Tsudik, G., Waidner.M.:
Design implementation and deployment of the iKP secure electronic payment system. IEEE
Journal of Selected Areas in Communications (2000)
4. Abad Peiro, J.L., Asokan, N., Steiner, M., Waidner., M.: Designing a generic payment ser-
vice. IBM Systems Journal, vol. 37, N
◦
1 (1998)
5. Dasweni, N., Boneh, D., Garcia-Molina, H., Ketchpel, Paepcke, S.A.: SWAPEROO: a sim-
ple wallet architecture for payments, exchanges, refunds and other operations. 3rd Usenix
workshop on electronic commerce (1998)
6. Bolignano, D.: Towards the Formal Verification of Electronic Commerce Protocols. 10th
Computer Security Foundations Workshop, IEEE Computer Society Press (1997) 113–147
7. Weeks, S.: Understanding Trust Management systems. In Symp.on. Res.in Sec and Privacy
.IEEE Computer Society Press (2001)
8. Blaze, M., Ioannidis, J., Keromytis, D.: Experience with the Keynote Trust Management Sys-
tem: Applications and Future Directions. In Proceedings of the 1st International Conference
on Trust Management (2003) 283–300
9. Seamons, K., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Re-
quirements for Policy Languages for Trust Negotiation (2002)
10. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate
Theory. RFC 2693 (1999)
11. IEEE Standard 1012 for Software Verification and Validation (1998)
12. Li, N., Mitchell, J., Winsborough, W.: Distributed Credential Chain Discovery in Trust Man-
agement. Stanford Security Workshop (2002)
13. Anton, A., Earp, J.: Strategies for developing Policies and Requirements for Secure Elec-
tronic Commerce Systems. CCS2000 (2000)
60