L. De, A. , and T. A. Henzinger, Interface automata, In ACM, 2001.

M. Bartoletti and . Usage, Usage Automata, Lecture Notes in Computer Science, vol.5511, pp.52-69, 2009.
DOI : 10.1007/978-3-642-03459-6_4

A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, Enhancing Java ME Security Support with Resource Usage Monitoring, ICICS, pp.256-266, 2008.
DOI : 10.1145/359576.359585

M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli, Fine Grained Access Control with Trust and Reputation Management for Globus, OTM Conferences, pp.1505-1515, 2007.
DOI : 10.1007/978-3-540-76843-2_26

G. Costa, F. Martinelli, P. Mori, C. Schaefer, and T. Walter, Runtime monitoring for next generation Java ME platform, Computers & Security, vol.29, issue.1, 2009.
DOI : 10.1016/j.cose.2009.07.005

URL : https://hal.archives-ouvertes.fr/inria-00458909

N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer et al., Security-by-Contract (SxC) for software and services of mobile systems. In At your service -Service-Oriented Computing from an EU Perspective, 2008.

N. Dragoni, F. Massacci, T. Walter, and C. Schaefer, What the heck is this application doing? ??? A security-by-contract architecture for pervasive services, Computers & Security, vol.28, issue.7
DOI : 10.1016/j.cose.2009.06.005

A. Lazouski, F. Martinelli, F. Massacci, G. Costa, N. Dragoni et al., Extending Security-by-Contract with quantitative trust on mobile devices, Proceeding of CISIS 2010 The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, pp.872-877, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00536705

V. Issarny, A. Lazouski, F. Martinelli, F. Massacci, I. Matteucci et al., Security-by-Contractwith-Trust for mobile devices, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 2010.

L. Gong, Java security: present and near future, IEEE Micro, vol.17, issue.3, pp.14-19, 1997.
DOI : 10.1109/40.591650

]. H. Koshutanski, F. Martinelli, P. Mori, L. Borz, and A. Vaccarelli, A Fine-Grained and X.509-Based Access Control System for Globus, In OTM, issue.11, pp.1336-1350, 2006.
DOI : 10.1007/11914952_21

H. Koshutanski, A. Lazouski, F. Martinelli, and P. Mori, Enhancing grid security by fine-grained behavioral control and negotiation-based authorization, International Journal of Information Security, vol.6, issue.1, pp.291-314, 2009.
DOI : 10.1007/s10207-009-0083-4

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, 2005.
DOI : 10.1007/s10207-004-0046-8

F. Martinelli and I. Matteucci, Through Modeling to Synthesis of Security Automata, Electronic Notes in Theoretical Computer Science, vol.179, pp.31-46, 2007.
DOI : 10.1016/j.entcs.2006.08.029

C. George and . Necula, Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Langauges (POPL '97), pp.106-119, 1997.

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Sekar, V. N. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. Duvarney, Model-carrying code: a practical approach for safe execution of untrusted applications, SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp.15-28, 2003.