M. Abadi and V. Cortier, Deciding knowledge in security protocols under equational theories, Theoretical Computer Science, vol.367, issue.1-2, pp.2-32, 2006.
DOI : 10.1016/j.tcs.2006.08.032

URL : https://hal.archives-ouvertes.fr/inria-00000554

T. Avanesov, Y. Chevalier, M. A. Mekki, and M. Rusinowitch, Web Services Verification and Prudent Implementation, DPM/SETOP 2011, pp.173-189, 2012.
DOI : 10.1007/978-3-642-28879-1_12

URL : https://hal.archives-ouvertes.fr/hal-00641326

T. Avanesov, Y. Chevalier, M. Rusinowitch, and M. Turuani, Satisfiability of general intruder constraints with and without a set constructor, Journal of Symbolic Computation, vol.80, 2011.
DOI : 10.1016/j.jsc.2016.07.009

URL : https://hal.archives-ouvertes.fr/hal-01405842

M. Baudet, Deciding security of protocols against off-line guessing attacks, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.16-25, 2005.
DOI : 10.1145/1102120.1102125

Y. Chevalier, M. A. Mekki, and M. Rusinowitch, Automatic Composition of Services with Security Policies, 2008 IEEE Congress on Services, Part I, pp.529-537, 2008.
DOI : 10.1109/SERVICES-1.2008.13

URL : https://hal.archives-ouvertes.fr/inria-00330338

R. Corin, S. Etalle, and A. Saptawijaya, A logic for constraint-based security protocol analysis, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.155-168, 2006.
DOI : 10.1109/SP.2006.3

G. Costa, P. Degano, and F. Martinelli, Secure service orchestration in open networks, Journal of Systems Architecture, vol.57, issue.3, pp.231-239, 2011.
DOI : 10.1016/j.sysarc.2010.09.001

D. Dolev and A. Yao, On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1983.

A. Armando, The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures, TACAS, pp.267-282, 2012.
DOI : 10.1007/978-3-642-28756-5_19

URL : https://hal.archives-ouvertes.fr/hal-00759725

S. Frau and M. T. Dashti, Integrated Specification and Verification of Security Protocols and Policies, 2011 IEEE 24th Computer Security Foundations Symposium, pp.27-29, 2011.
DOI : 10.1109/CSF.2011.9

A. Herzig, E. Lorini, J. F. Hübner, and L. Vercouter, A logic of trust and reputation, Logic Journal of IGPL, vol.18, issue.1, pp.214-244, 2010.
DOI : 10.1093/jigpal/jzp077

URL : https://hal.archives-ouvertes.fr/hal-00405595

M. Kourjieh, Logical Analysis and Verification of Cryptographic Protocols, Thèse de doctorat, 2009.

D. Kähler, R. Küsters, and T. Truderung, Infinite State AMC-Model Checking for Cryptographic Protocols, 22nd Annual IEEE Symposium on Logic in Computer Science (LICS 2007), pp.181-192, 2007.
DOI : 10.1109/LICS.2007.26

E. Lorini and R. Demolombe, Trust and Norms in the Context of Computer Security: A Logical Formalization, Deontic Logic in Computer Science, pp.50-64, 2008.
DOI : 10.1007/978-3-540-70525-3_6

C. Lynch and C. Meadows, On the Relative Soundness of the Free Algebra Model for Public Key Encryption, Proceedings of the, pp.43-54, 2005.
DOI : 10.1016/j.entcs.2004.05.018

F. Martinelli, Towards an Integrated Formal Analysis for Security and Trust, 7th IFIP WG 6.1 International Conference, FMOODS 2005, pp.115-130, 2005.
DOI : 10.1007/3-540-45608-2_3

A. David and . Mcallester, Automatic recognition of tractability in inference relations, Journal of the ACM, vol.40, pp.284-303, 1993.

J. Millen and V. Shmatikov, Constraint solving for boundedprocess cryptographic protocol analysis, Proceedings of the 8th ACM conference on Computer and Communications Security, CCS '01, pp.166-175, 2001.

M. Turuani, The CL-Atse Protocol Analyser, Term Rewriting and Applications (RTA), pp.277-286, 2006.
DOI : 10.1007/11805618_21

URL : https://hal.archives-ouvertes.fr/inria-00103573

Y. Chevalier, M. A. Mekki, and M. Rusinowitch, Orchestration under Security Constraints, Proceedings of FMCO 2010, pp.23-44, 2012.
DOI : 10.1007/11805618_21

URL : https://hal.archives-ouvertes.fr/hal-00642855