T. Avanesov, Y. Chevalier, M. Rusinowitch, and M. Turuani, Satisfiability of general intruder constraints with and without a set constructor, Journal of Symbolic Computation, vol.80, 2010.
DOI : 10.1016/j.jsc.2016.07.009

URL : https://hal.archives-ouvertes.fr/hal-01405842

L. Baresi, A. Maurino, and S. Modafferi, Towards distributed bpel orchestrations, ECEASST, vol.3, 2006.

D. Berardi, D. Calvanese, G. De-giacomo, R. Hull, and M. Mecella, Automatic Composition of Transition-based semantic Web Services with Messaging, Proc. 31st Int. Conf. Very Large Data Bases, VLDB 2005, pp.613-624, 2005.

D. Berardi, D. Calvanese, G. De-giacomo, M. Lenzerini, and M. Mecella, Automatic Composition of E-services That Export Their Behavior, Proc. 1st Int. Conf. on Service Oriented Computing, ICSOC 2003, 2003.
DOI : 10.1007/978-3-540-24593-3_4

K. Bhargavan, R. Corin, P. M. Deniélou, C. Fournet, and J. J. Leifer, Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, pp.124-140, 2009.
DOI : 10.1109/CSF.2009.26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.187

A. Bucchiarone and S. Gnesi, A survey on services composition languages and models, Proceedings of International Workshop on Web Services Modeling and Testing (WS-MaTe2006), pp.51-63, 2006.

T. Bultan, X. Fu, R. Hull, and J. Su, Conversation specification, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.403-410, 2003.
DOI : 10.1145/775152.775210

S. Bursuc, S. Delaune, and H. Comon-lundh, Deducibility Constraints, ASIAN'09, pp.24-38, 2009.
DOI : 10.1007/978-3-642-10622-4_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.5226

D. Calvanese, G. D. Giacomo, M. Lenzerini, M. Mecella, and F. Patrizi, Automatic service composition and synthesis: the roman model, IEEE Data Eng. Bull, vol.31, issue.3, pp.18-22, 2008.

J. Camara, J. A. Martin, G. Salaun, J. Cubo, M. Ouederni et al., ITACA: An integrated toolbox for the automatic composition and adaptation of Web services, 2009 IEEE 31st International Conference on Software Engineering, pp.9627-630, 2009.
DOI : 10.1109/ICSE.2009.5070572

Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani, An NP decision procedure for protocol insecurity with XOR, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., pp.247-274, 2005.
DOI : 10.1109/LICS.2003.1210066

URL : https://hal.archives-ouvertes.fr/inria-00103954

Y. Chevalier, M. A. Mekki, and M. Rusinowitch, Automatic Composition of Services with Security Policies, 2008 IEEE Congress on Services, Part I, pp.529-537, 2008.
DOI : 10.1109/SERVICES-1.2008.13

URL : https://hal.archives-ouvertes.fr/inria-00330338

Y. Chevalier and M. Rusinowitch, Compiling and securing cryptographic protocols, Information Processing Letters, vol.110, issue.3, pp.116-122, 2010.
DOI : 10.1016/j.ipl.2009.11.004

URL : https://hal.archives-ouvertes.fr/inria-00527633

D. Dolev and A. Yao, On the Security of Public-Key Protocols, IEEE Transactions on Information Theory, vol.2, issue.29, 1983.

F. J. Fabrega, J. C. Herzog, and J. D. Guttman, Strand spaces: why is a security protocol correct? In Security and Privacy, Proceedings. 1998 IEEE Symposium on, pp.160-171, 1998.

J. D. Guttman, F. J. Thayer, J. A. Carlson, J. C. Herzog, J. D. Ramsdell et al., Trust Management in Strand Spaces: A Rely-Guarantee Method, Proc. of the European Symposium on Programming, pp.325-339, 2004.
DOI : 10.1007/978-3-540-24725-8_23

J. A. Martín, M. F. , and E. Pimentel, Synthesis of secure adaptors, JLAP, 2011.
DOI : 10.1016/j.jlap.2011.08.001

L. Mazaré, Computational Soundness of Symbolic Models for Cryptographic Protocols 21. OASIS. Security Assertion Markup Language (SAML) v2.0, 2005.

F. Patrizi, An Introduction to Simulation-Based Techniques for Automated Service Composition, Electronic Proceedings in Theoretical Computer Science, vol.2, pp.37-49, 2009.
DOI : 10.4204/EPTCS.2.4

G. Pedraza and J. Estublier, Distributed Orchestration Versus Choreography: The FOCAS Approach, ICSP '09, pp.75-86, 2009.
DOI : 10.1023/B:DAPD.0000045366.15607.67

URL : https://hal.archives-ouvertes.fr/hal-00941672

C. Peltz, Web Services Orchestration, 2003.

C. Peltz, Web services orchestration and choreography, Computer, vol.36, issue.10, pp.46-52, 2003.
DOI : 10.1109/MC.2003.1236471

S. Quinton, I. Ben-hafaiedh, and S. Graf, From orchestration to choreography: Memoryless and distributed orchestrators, Proc. of FLACOS'09, 2009.

M. Ter-beek, A. Bucchiarone, and S. Gnesi, Web service composition approaches: From industrial standards to formal methods. Internet and Web Applications and Services, ICIW '07. Second International Conference on, p.15, 2007.

M. Trainotti, M. Pistore, G. Calabrese, G. Zacco, G. Lucchese et al., ASTRO: Supporting Composition and Execution of Web Services, ICSOC 2005, pp.495-501, 2005.
DOI : 10.1007/11596141_39

M. Turuani, The CL-Atse Protocol Analyser, Proceedings of RTA'06, pp.277-286, 2006.
DOI : 10.1007/11805618_21

URL : https://hal.archives-ouvertes.fr/inria-00103573