G. Berry and G. Boudol, The chemical abstract machine, Theoretical Computer Science, vol.96, issue.1, 1992.
URL : https://hal.archives-ouvertes.fr/inria-00075426

K. Bhargavan, Modular verification of security protocol code by typing, POPL, 2010.

K. Bhargavan, C. Fournet, and A. Gordon, Verifying policybased security for web services, CCS, 2004.

A. Chander, D. Dean, and J. Mitchell, A Distributed High Assurance Reference Monitor, ISC, 2004.
DOI : 10.1007/978-3-540-30144-8_20

C. Fournet, A. Gordon, and S. Maffeis, A Type Discipline for Authorization in Distributed Systems, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007.
DOI : 10.1109/CSF.2007.7

R. Lucchi and M. Mazzara, A pi-calculus based semantics for WS-BPEL, Journal of Logic and Algebraic Programming, 2005.
DOI : 10.1016/j.jlap.2006.05.007

C. Pautasso, O. Zimmermann, and F. Leymann, Restful web services vs. "big"' web services, Proceeding of the 17th international conference on World Wide Web , WWW '08, pp.805-814, 2008.
DOI : 10.1145/1367497.1367606

F. Seehusen and K. Stolen, Information flow security, abstraction and composition, IET Information Security, vol.3, issue.1, pp.9-33, 2009.
DOI : 10.1049/iet-ifs:20080069

H. T. Vieira, L. Caires, J. , and C. Seco, The Conversation Calculus: A Model of Service-Oriented Computation, Proc. of ESOP'08, 2008.
DOI : 10.1007/978-3-540-78739-6_21