I. Aktug and K. Naliuka, ConSpec ??? A formal language for policy specification, Science of Computer Programming, vol.74, issue.1-2, pp.2-12, 2008.
DOI : 10.1016/j.scico.2008.09.004

L. De-alfaro and T. A. Henzinger, Interface automata, ACM Proceedings of the 8th European software engineering conference, 2001.

M. Bartoletti, Usage automata In Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, LNCS, vol.5511, pp.52-69, 2009.

M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli, Fine Grained Access Control with Trust and Reputation Management for Globus, OTM Conferences, pp.1505-1515, 2007.
DOI : 10.1007/978-3-540-76843-2_26

G. Costa, N. Dragoni, V. Issarny, A. Lazouski, F. Martinelli et al., Security-by-Contract-with-Trust for mobile devices, JOWUA, vol.1, issue.4, pp.75-91, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00549662

G. Costa, N. Dragoni, A. Lazouski, F. Martinelli, F. Massacci et al., Extending Security-by-Contract with Quantitative Trust on Mobile Devices, 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp.872-877, 2010.
DOI : 10.1109/CISIS.2010.33

URL : https://hal.archives-ouvertes.fr/inria-00536705

G. Costa, F. Martinelli, P. Mori, C. Schaefer, and T. Walter, Runtime monitoring for next generation Java ME platform. Computers & Security, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00458909

G. Costa and I. Matteucci, Trust-Driven Policy Enforcement through Gate Automata, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
DOI : 10.1109/IMIS.2011.88

URL : https://hal.archives-ouvertes.fr/hal-00661572

L. Desmet, W. Joosen, F. Massacci, K. Naliuka, P. Philippaerts et al., The S3MS.NET Run Time Monitor, Electronic Notes in Theoretical Computer Science, vol.253, issue.5, pp.153-159, 2009.
DOI : 10.1016/j.entcs.2009.11.021

N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer et al., Security-by-Contract (SxC) for software and services of mobile systems. In At your service -Service-Oriented Computing from an EU Perspective, 2008.

H. Koshutanski, A. Lazouski, F. Martinelli, and P. Mori, Enhancing grid security by fine-grained behavioral control and negotiation-based authorization, International Journal of Information Security, vol.6, issue.1, pp.291-314, 2009.
DOI : 10.1007/s10207-009-0083-4

H. Koshutanski, F. Martinelli, P. Mori, L. Borz, and A. Vaccarelli, A Fine-Grained and X.509-Based Access Control System for Globus, OTM Conferences, pp.1336-1350, 2006.
DOI : 10.1007/11914952_21

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, 2005.
DOI : 10.1007/s10207-004-0046-8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. Martinelli and I. Matteucci, Through Modeling to Synthesis of Security Automata, Electronic Notes in Theoretical Computer Science, vol.179, pp.31-46, 2007.
DOI : 10.1016/j.entcs.2006.08.029

F. Martinelli and P. Mori, On usage control for GRID systems, Future Generation Computer Systems, vol.26, issue.7, pp.1032-1042, 2010.
DOI : 10.1016/j.future.2009.12.005

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=