Towards a declarative language and system for secure networking, Proceedings of the 3rd USENIX international workshop on Networking meets databases, page 2. USENIX Association, 2007. ,
Private authentication, Theoretical Computer Science, vol.322, issue.3, pp.427-476, 2004. ,
DOI : 10.1016/j.tcs.2003.12.023
A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.1-70, 1999. ,
DOI : 10.1145/266420.266432
Towards a Formal Foundation of Web Security, 2010 23rd IEEE Computer Security Foundations Symposium, pp.290-304, 2010. ,
DOI : 10.1109/CSF.2010.27
Verified Cryptographic Implementations for TLS, ACM Transactions on Information and System Security, vol.15, issue.1, pp.1-3, 2012. ,
DOI : 10.1145/2133375.2133378
URL : https://hal.archives-ouvertes.fr/hal-00863381
Verified implementations of the information card federated identity-management protocol, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.123-135, 2008. ,
DOI : 10.1145/1368310.1368330
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001. ,
DOI : 10.1109/CSFW.2001.930138
Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009. ,
DOI : 10.3233/JCS-2009-0339
ProVerif: Automatic Cryptographic Protocol Verier, User Manual and Tutorial ,
Featherweight Firefox, Proceedings of the 2010 USENIX conference on Web, 2010. ,
Universally composable security: a new paradigm for cryptographic protocols, Proceedings 2001 IEEE International Conference on Cluster Computing, pp.136-145, 2001. ,
DOI : 10.1109/SFCS.2001.959888
Assertions and protocols for the oasis security assertion markup language (saml) v2, 2005. ,
WebSpi and web application models, 2011. ,
Universally composable security analysis of oauth v2.0. IACR Cryptology ePrint Archive, p.526, 2011. ,
Security Analysis of Double Redirection Protocols On adversary models and compositional security, IEEE Security & Privacy, vol.9, issue.3, pp.26-32, 2011. ,
Binder, a logic-based security language, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.105-113, 2002. ,
DOI : 10.1109/SECPRI.2002.1004365
The OAuth 1, Protocol. IETF RFC, vol.5849, 2010. ,
A type discipline for authorization policies, ACM Trans. Program. Lang. Syst, vol.29, issue.5, 2007. ,
The OAuth 2.0 Authorization Protocol, IETF Internet Draft, 2011. ,
Using static analysis to validate the saml single sign-on protocol, Proceedings of the 2005 workshop on Issues in the theory of security, WITS '05, pp.27-40, 2005. ,
Alloy: A Logical Modelling Language, ZB, 2003. ,
DOI : 10.1007/3-540-44880-2_1
Formal analysis of Facebook Connect Single Sign-On authentication protocol, SofSem 2011 Proceedings of Student Research Forum, pp.99-116, 2011. ,
Formal Verification of OAuth 2.0 Using Alloy Framework, 2011 International Conference on Communication Systems and Network Technologies, pp.655-659, 2011. ,
DOI : 10.1109/CSNT.2011.141
Analysis of liberty single-sign-on with enabled clients, IEEE Internet Computing, vol.7, issue.6, pp.38-44, 2003. ,
DOI : 10.1109/MIC.2003.1250582
OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-15, 2006. ,
DOI : 10.1145/1179529.1179532
Knowledge flow analysis for security protocols, 2006. ,
A semantic model for authentication protocols, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp.178-194, 1993. ,
DOI : 10.1109/RISP.1993.287633
Information-Flow-Based Access Control for Web Browsers, IEICE Transactions on Information and Systems, vol.92, issue.5, pp.92-836, 2009. ,
DOI : 10.1587/transinf.E92.D.836