Satisfiability of general intruder constraints with and without a set constructor, Journal of Symbolic Computation, vol.80, 2010. ,
DOI : 10.1016/j.jsc.2016.07.009
URL : https://hal.archives-ouvertes.fr/hal-01405842
Towards distributed bpel orchestrations, ECEASST, vol.3, 2006. ,
Automatic Composition of Transition-based semantic Web Services with Messaging, Proc. 31st Int. Conf. Very Large Data Bases, VLDB 2005, pp.613-624, 2005. ,
Automatic Composition of E-services That Export Their Behavior, Proc. 1st Int. Conf. on Service Oriented Computing, ICSOC 2003, 2003. ,
DOI : 10.1007/978-3-540-24593-3_4
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, pp.124-140, 2009. ,
DOI : 10.1109/CSF.2009.26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.187
A survey on services composition languages and models, Proceedings of International Workshop on Web Services Modeling and Testing (WS-MaTe2006), pp.51-63, 2006. ,
Conversation specification, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.403-410, 2003. ,
DOI : 10.1145/775152.775210
Deducibility Constraints, ASIAN'09, pp.24-38, 2009. ,
DOI : 10.1007/978-3-642-10622-4_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.5226
Automatic service composition and synthesis: the roman model, IEEE Data Eng. Bull, vol.31, issue.3, pp.18-22, 2008. ,
ITACA: An integrated toolbox for the automatic composition and adaptation of Web services, 2009 IEEE 31st International Conference on Software Engineering, pp.9627-630, 2009. ,
DOI : 10.1109/ICSE.2009.5070572
An NP decision procedure for protocol insecurity with XOR, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., pp.247-274, 2005. ,
DOI : 10.1109/LICS.2003.1210066
URL : https://hal.archives-ouvertes.fr/inria-00103954
Automatic Composition of Services with Security Policies, 2008 IEEE Congress on Services, Part I, pp.529-537, 2008. ,
DOI : 10.1109/SERVICES-1.2008.13
URL : https://hal.archives-ouvertes.fr/inria-00330338
Compiling and securing cryptographic protocols, Information Processing Letters, vol.110, issue.3, pp.116-122, 2010. ,
DOI : 10.1016/j.ipl.2009.11.004
URL : https://hal.archives-ouvertes.fr/inria-00527633
On the Security of Public-Key Protocols, IEEE Transactions on Information Theory, vol.2, issue.29, 1983. ,
Strand spaces: why is a security protocol correct? In Security and Privacy, Proceedings. 1998 IEEE Symposium on, pp.160-171, 1998. ,
Trust Management in Strand Spaces: A Rely-Guarantee Method, Proc. of the European Symposium on Programming, pp.325-339, 2004. ,
DOI : 10.1007/978-3-540-24725-8_23
Synthesis of secure adaptors, JLAP, 2011. ,
DOI : 10.1016/j.jlap.2011.08.001
Computational Soundness of Symbolic Models for Cryptographic Protocols 21. OASIS. Security Assertion Markup Language (SAML) v2.0, 2005. ,
An Introduction to Simulation-Based Techniques for Automated Service Composition, Electronic Proceedings in Theoretical Computer Science, vol.2, pp.37-49, 2009. ,
DOI : 10.4204/EPTCS.2.4
Distributed Orchestration Versus Choreography: The FOCAS Approach, ICSP '09, pp.75-86, 2009. ,
DOI : 10.1023/B:DAPD.0000045366.15607.67
URL : https://hal.archives-ouvertes.fr/hal-00941672
Web Services Orchestration, 2003. ,
Web services orchestration and choreography, Computer, vol.36, issue.10, pp.46-52, 2003. ,
DOI : 10.1109/MC.2003.1236471
From orchestration to choreography: Memoryless and distributed orchestrators, Proc. of FLACOS'09, 2009. ,
Web service composition approaches: From industrial standards to formal methods. Internet and Web Applications and Services, ICIW '07. Second International Conference on, p.15, 2007. ,
ASTRO: Supporting Composition and Execution of Web Services, ICSOC 2005, pp.495-501, 2005. ,
DOI : 10.1007/11596141_39
The CL-Atse Protocol Analyser, Proceedings of RTA'06, pp.277-286, 2006. ,
DOI : 10.1007/11805618_21
URL : https://hal.archives-ouvertes.fr/inria-00103573