M. Abadi and C. Fournet, Mobile values, new names, and secure communication, ACM SIGPLAN Notices, vol.36, issue.3, pp.104-115, 2001.
DOI : 10.1145/373243.360213

URL : https://hal.archives-ouvertes.fr/hal-01423924

B. Adida, Helios: Web-based open-audit voting, USENIX Security Symposium, pp.335-348, 2008.

B. Adida, A. Barth, and C. Jackson, Rootkits for JavaScript environments, Workshop on Offensive Technologies, 2009.

D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song, Towards a Formal Foundation of Web Security, 2010 23rd IEEE Computer Security Foundations Symposium, pp.290-304, 2010.
DOI : 10.1109/CSF.2010.27

M. Arapinis, S. Bursuc, and M. Ryan, Privacy Supporting Cloud Computing: ConfiChair, a Case Study, POST, pp.89-108, 2012.
DOI : 10.1007/978-3-642-28641-4_6

C. Bansal, K. Bhargavan, and S. Maffeis, Discovering Concrete Attacks on Website Authorization by Formal Analysis, 2012 IEEE 25th Computer Security Foundations Symposium, pp.247-262, 2012.
DOI : 10.1109/CSF.2012.27

URL : https://hal.archives-ouvertes.fr/hal-00815834

A. Barth, C. Jackson, and J. C. Mitchell, Robust defenses for cross-site request forgery, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.75-88, 2008.
DOI : 10.1145/1455770.1455782

A. Belenko and D. Sklyarov, Secure Password Managers " and " Military-Grade Encryption " on Smartphones: Oh, Really?, 2012.

K. Bhargavan and A. Delignat-lavaud, Web-based attacks on host-proof encrypted storage, Workshop on Offensive Technologies (WOOT), 2012.
URL : https://hal.archives-ouvertes.fr/hal-00863383

B. Blanchet, Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009.
DOI : 10.3233/JCS-2009-0339

B. Blanchet and A. Chaudhuri, Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.12

B. Blanchet and B. Smyth, ProVerif: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial
DOI : 10.1109/csfw.2001.930138

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Bohannon and B. C. Pierce, Featherweight Firefox: Formalizing the core of a web browser, WebApps, 2010.

T. Groß, B. Pfitzmann, and A. Sadeghi, Browser model for security analysis of browser-based protocols, ESORICS, pp.489-508, 2005.

E. Hammer-lahav, D. Recordon, and D. Hardt, The OAuth 2.0 Authorization Protocol, IETF Internet Draft, 2011.

D. Jackson, Alloy: A Logical Modelling Language, ZB, 2003.
DOI : 10.1007/3-540-44880-2_1

S. Kamara and K. Lauter, Cryptographic Cloud Storage, Financial cryptograpy and data security, pp.136-149, 2010.
DOI : 10.1007/978-3-642-14992-4_13

J. Kelsey, B. Schneier, C. Hall, and D. Wagner, Secure applications of low-entropy keys, ISW '97, pp.121-134, 1998.
DOI : 10.1007/BFb0030415

G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson, Busting frame busting: a study of clickjacking vulnerabilities at popular sites, 2010.

S. Yoshihama, T. Tateishi, N. Tabuchi, and T. Matsumoto, Information-Flow-Based Access Control for Web Browsers, IEICE Transactions on Information and Systems, vol.92, issue.5, pp.92-836, 2009.
DOI : 10.1587/transinf.E92.D.836