E. Anceaume, R. Ludinard, M. Potop-butucaru, and F. Tronel, Bitcoin a Distributed Shared Register, Stabilization, Safety, and Security of Distributed Systems -19th International Symposium, SSS 2017 Proceedings, pp.456-468, 2017.
DOI : 10.1007/978-3-319-56614-6_22

URL : https://hal.archives-ouvertes.fr/hal-01522360

A. W. Appel and E. W. Felten, Proof-carrying authentication, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.52-62, 1999.
DOI : 10.1145/319709.319718

URL : http://www.cs.princeton.edu/~appel/papers/says.ps

N. Atzei, M. Bartoletti, and T. Cimoli, A Survey of Attacks on Ethereum Smart Contracts (SoK), Conference on Principles of Security and Trust, 2017.
DOI : 10.5210/fm.v2i9.548

V. Bernat, H. Ruess, and N. Shankar, First-order cyberlogic, 2005.

K. Bhargavan, A. Delignat-lavaud, C. Fournet, A. Gollamudi, G. Gonthier et al., Formal Verification of Smart Contracts, Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, PLAS'16, 2016.
DOI : 10.1145/2535838.2535889

URL : https://hal.archives-ouvertes.fr/hal-01400469

M. Blaze, J. Feigenbaum, and A. D. Keromytis, Keynote: Trust management for public-key infrastructures (position paper), Security Protocols, 6th International Workshop Proceedings, pp.59-63, 1998.
DOI : 10.1007/3-540-49135-x_9

URL : http://www1.cs.columbia.edu/~angelos/Papers/keynote-position.pdf

M. Blaze, J. Feigenbaum, and M. Strauss, Compliance checking in the PolicyMaker trust management system, pp.254-274, 1998.
DOI : 10.1007/BFb0055488

URL : http://www.research.att.com/resources/trs/./TRs/98/98.3/98.3.2.body.ps

T. Crain, V. Gramoli, M. Larrea, and M. , (leader/randomization/signature)-free byzantine consensus for consortium blockchains Analysis of the dao exploit, 2016.

C. Dannen, Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners, 2017.
DOI : 10.1007/978-1-4842-2535-6

S. Fenech, G. J. Pace, and G. Schneider, CLAN: A Tool for Contract Analysis and Conflict Discovery, pp.90-96, 2009.
DOI : 10.1007/978-3-642-04761-9_8

URL : https://www.um.edu.mt/library/oar//bitstream/123456789/22738/1/CLAN_A_Tool_for_Contract_Analysis_and_Conflict_Dis.pdf

J. A. Garay, A. Kiayias, and N. Leonardos, The Bitcoin Backbone Protocol: Analysis and Applications, pp.281-310, 2015.
DOI : 10.1007/978-3-662-46803-6_10

L. Goodman, A self-amending crypto-ledger. tezos white paper, 2014.

N. Li, B. N. Grosof, and J. Feigenbaum, A Practically Implementable and Tractable Delegation Logic, Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp.27-42, 2000.
DOI : 10.2139/ssrn.290100

P. Mcnamara, Deontic logic, 2014.
DOI : 10.1016/S1874-5857(06)80029-4

S. Owre, J. M. Rushby, and N. Shankar, PVS: A prototype verification system, Conference on Automated Deduction: Automated Deduction, pp.748-752, 1992.
DOI : 10.1007/3-540-55602-8_217

URL : http://www.csl.sri.com/papers/c/a/cade92-pvs/cade92-pvs.ps.gz

H. Prakken and G. Sartor, The Role of Logic in Computational Models of Legal Argument: A Critical Survey, pp.342-381, 2002.
DOI : 10.1007/3-540-45632-5_14

N. Rueß and . Shankar, Introducing cyberlogic Making sense of blockchain smart contracts, HCSS'03?High Confidence Software and Systems Conference, 2003.

D. Tapscott and A. Tapscott, The blockchain revolution:how the technology behind bitcoin is changing Money,Business and the World Ethereum: A secure decentralised generalised transaction ledger, pp.72-2016

W. Yao, Trust management for widely distributed systems, 2004.