L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978.
DOI : 10.1145/359545.359563

M. Maekawa, A N algorithm for mutual exclusion in decentralized systems, ACM Transactions on Computer Systems, vol.3, issue.2, pp.145-159, 1985.
DOI : 10.1145/214438.214445

G. Ricart and A. K. Agrawala, An optimal algorithm for mutual exclusion in computer networks, Communications of the ACM, vol.24, issue.1, pp.9-17, 1981.
DOI : 10.1145/358527.358537

M. Naimi and M. Trehel, How to detect a failure and regenerate the token in the log(N ) distributed algorithm for mutual exclusion, Proceedings of the 2nd International Workshop on Distributed Algorithms, pp.155-166, 1988.

K. Raymond, A tree-based algorithm for distributed mutual exclusion, ACM Transactions on Computer Systems, vol.7, issue.1, pp.61-77, 1989.
DOI : 10.1145/58564.59295

M. Naimi, M. Trehel, and A. Arnold, A Log (N) Distributed Mutual Exclusion Algorithm Based on Path Reversal, Journal of Parallel and Distributed Computing, vol.34, issue.1, pp.1-13, 1996.
DOI : 10.1006/jpdc.1996.0041

J. Sopena, L. B. Arantes, M. Bertier, and P. Sens, A Fault-Tolerant Token-Based Mutual Exclusion Algorithm Using a Dynamic Tree, Euro-Par'05, pp.654-663, 2005.
DOI : 10.1007/11549468_72

URL : https://hal.archives-ouvertes.fr/inria-00179797

M. Quinson, F. Vernier, F. Wagner, and . Mueller, Byte-range asynchronous locking in distributed settings Distributed and network-based Processing -PDP Available: http://hal.inria.fr/inria-00338189/en Token-based read/write-locks for distributed mutual exclusion, 17th Euromicro International Conference on Parallel Proceedings from the 6th International Euro-Par Conference on Parallel Processing, ser. Euro-Par '00, pp.1185-1195, 2000.

A. Mohamed and B. Naimi, Distributed concurrent control with readers and writers, International Conference " PARALLEL 90, 1990.

J. Gustedt, Data handover: Reconciling message passing and shared memory, Foundations of Global Computing, ser. Dagstuhl Seminar Proceedings, p.297, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00549564

M. Naimi and M. Trehel, How to detect a failure and regenerate the token in the log(N ) distributed algorithm for mutual exclusion, WDAG, ser, pp.155-166, 1987.

S. Hernane, J. Leila, M. Gustedt, . Benyettou, . Lncs et al., Modeling and Experimental Validation of the Data Handover??API, Advances in Grid and Pervasive Computing, ser, pp.117-126, 2011.
DOI : 10.1287/opre.9.3.383

URL : https://hal.archives-ouvertes.fr/inria-00547598