M. Abadi and B. T. Loo, Towards a declarative language and system for secure networking, Proceedings of the 3rd USENIX international workshop on Networking meets databases, page 2. USENIX Association, 2007.

M. Abadi and C. Fournet, Private authentication, Theoretical Computer Science, vol.322, issue.3, pp.427-476, 2004.
DOI : 10.1016/j.tcs.2003.12.023

M. Abadi and A. D. Gordon, A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.1-70, 1999.
DOI : 10.1145/266420.266432

D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song, Towards a Formal Foundation of Web Security, 2010 23rd IEEE Computer Security Foundations Symposium, pp.290-304, 2010.
DOI : 10.1109/CSF.2010.27

K. Bhargavan, C. Fournet, and R. Corin, Verified Cryptographic Implementations for TLS, ACM Transactions on Information and System Security, vol.15, issue.1, pp.1-3, 2012.
DOI : 10.1145/2133375.2133378

URL : https://hal.archives-ouvertes.fr/hal-00863381

K. Bhargavan, C. Fournet, A. D. Gordon, and N. Swamy, Verified implementations of the information card federated identity-management protocol, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.123-135, 2008.
DOI : 10.1145/1368310.1368330

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001.
DOI : 10.1109/CSFW.2001.930138

B. Blanchet, Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009.
DOI : 10.3233/JCS-2009-0339

B. Blanchet and B. Smyth, ProVerif: Automatic Cryptographic Protocol Verier, User Manual and Tutorial

A. Bohannon and B. C. Pierce, Featherweight Firefox, Proceedings of the 2010 USENIX conference on Web, 2010.

R. Canetti, Universally composable security: a new paradigm for cryptographic protocols, Proceedings 2001 IEEE International Conference on Cluster Computing, pp.136-145, 2001.
DOI : 10.1109/SFCS.2001.959888

S. Cantor, J. Kemp, R. Philpott, and E. Maler, Assertions and protocols for the oasis security assertion markup language (saml) v2, 2005.

C. Bansal, K. Bhargavan, and S. Maffeis, WebSpi and web application models, 2011.

S. Chari, C. S. Jutla, and A. Roy, Universally composable security analysis of oauth v2.0. IACR Cryptology ePrint Archive, p.526, 2011.

F. Corella, K. Lewison18, ]. A. Datta, J. Franklin, D. Garg et al., Security Analysis of Double Redirection Protocols On adversary models and compositional security, IEEE Security & Privacy, vol.9, issue.3, pp.26-32, 2011.

J. Detreville, Binder, a logic-based security language, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.105-113, 2002.
DOI : 10.1109/SECPRI.2002.1004365

E. Hammer-lahav, The OAuth 1, Protocol. IETF RFC, vol.5849, 2010.

C. Fournet, A. D. Gordon, and S. Maffeis, A type discipline for authorization policies, ACM Trans. Program. Lang. Syst, vol.29, issue.5, 2007.

E. Hammer-lahav, D. Recordon, and D. Hardt, The OAuth 2.0 Authorization Protocol, IETF Internet Draft, 2011.

M. Steffen, J. Hansen, H. Skriver, and . Nielson, Using static analysis to validate the saml single sign-on protocol, Proceedings of the 2005 workshop on Issues in the theory of security, WITS '05, pp.27-40, 2005.

D. Jackson, Alloy: A Logical Modelling Language, ZB, 2003.
DOI : 10.1007/3-540-44880-2_1

M. Miculan and C. Urban, Formal analysis of Facebook Connect Single Sign-On authentication protocol, SofSem 2011 Proceedings of Student Research Forum, pp.99-116, 2011.

S. Pai, Y. Sharma, S. Kumar, R. M. Pai, and S. Singh, Formal Verification of OAuth 2.0 Using Alloy Framework, 2011 International Conference on Communication Systems and Network Technologies, pp.655-659, 2011.
DOI : 10.1109/CSNT.2011.141

B. Pfitzmann and M. Waidner, Analysis of liberty single-sign-on with enabled clients, IEEE Internet Computing, vol.7, issue.6, pp.38-44, 2003.
DOI : 10.1109/MIC.2003.1250582

D. Recordon and D. Reed, OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-15, 2006.
DOI : 10.1145/1179529.1179532

E. Torlak, M. Van-dijk, B. Gassend, D. Jackson, and S. Devadas, Knowledge flow analysis for security protocols, 2006.

T. Y. Woo and S. S. Lam, A semantic model for authentication protocols, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp.178-194, 1993.
DOI : 10.1109/RISP.1993.287633

S. Yoshihama, T. Tateishi, N. Tabuchi, and T. Matsumoto, Information-Flow-Based Access Control for Web Browsers, IEICE Transactions on Information and Systems, vol.92, issue.5, pp.92-836, 2009.
DOI : 10.1587/transinf.E92.D.836