P. Darondeau, L. Hélouët, and M. Mukund, Assembling Sessions, ATVA, ser, pp.259-274, 2011.
DOI : 10.1007/978-3-642-24372-1_19

URL : https://hal.archives-ouvertes.fr/hal-00650950

F. C. David, M. J. Brewer, and . Nash, The chinese wall security policy, EEE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY. IEEE, pp.206-214, 1989.

A. Finkel and P. Schnoebelen, Well-structured transition systems everywhere!, Theoretical Computer Science, vol.256, issue.1-2, pp.63-92, 2001.
DOI : 10.1016/S0304-3975(00)00102-X

URL : http://doi.org/10.1016/s0304-3975(00)00102-x

G. Ding, Subgraphs and well-quasi-ordering, Journal of Graph Theory, pp.489-502, 1992.
DOI : 10.1002/jgt.3190160509

T. Andrews, F. Curbera, H. Dholakia, Y. Goland, J. Klein et al., Business process execution language for web services (BPEL4WS). version 1.1, 2003.

J. Misra and W. Cook, Computation orchestration Software and Systems Modeling, pp.83-110, 2007.

S. Abiteboul, O. Benjelloun, I. Manolescu, T. Milo, and R. Weber, Active XML: A Data-Centric Perspective on Web Services, BDA02, 2002.
DOI : 10.1007/978-3-662-10874-1_12

S. Joshi and B. König, Applying the Graph Minor Theorem to the Verification of Graph Transformation Systems, Proceedings of CAV 2008, ser. LNCS, pp.214-226, 2008.
DOI : 10.1007/978-3-540-70545-1_21

N. Bertrand, G. Delzanno, B. König, A. Sangnier, and J. Stückrath, On the decidability status of reachability and coverability in graph transformation systems, Rewriting Techniques and Applications (RTA'12), ser. LIPIcs, pp.101-116, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00752446

K. Honda, N. Yoshida, and M. Carbone, Multiparty asynchronous session types, POPL, pp.273-284, 2008.
DOI : 10.1145/1328438.1328472

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.7594

P. Deniélou and N. Yoshida, Dynamic multirole session types, POPL, pp.435-446, 2011.

R. Demangeon and K. Honda, Nested Protocols in Session Types, CONCUR, 2012, pp.272-286
DOI : 10.1007/978-3-642-32940-1_20

L. Acciai and M. Boreale, Deciding safety properties in infinite-state pi-calculus via behavioural types, ICALP (2), ser. LNCS, pp.31-42, 2009.

T. Wies, D. Zufferey, and T. A. Henzinger, Forward analysis of depthbounded processes, FOSSACS, ser. LNCS, pp.94-108, 2010.

I. Lanese, F. Martins, V. T. Vasconcelos, and A. Ravara, Disciplining orchestration and conversation in service-oriented computing, " in SEFM, IEEE Computer Society, pp.305-314, 2007.

R. Bruni, I. Lanese, H. C. Melgratti, and E. Tuosto, Multiparty Sessions in SOC, COORDINATION, ser. LNCS, pp.67-82, 2008.
DOI : 10.1007/978-3-540-68265-3_5

M. Boreale, R. Bruni, R. De-nicola, and M. Loreti, Sessions and Pipelines for Structured Service Programming, FMOODS, ser. LNCS, pp.19-38, 2008.
DOI : 10.1007/978-3-540-68863-1_3

L. Caires and H. T. Vieira, Conversation types, Theor. Comput. Sci, vol.411, pp.51-52, 2010.

R. Pugliese and F. Tiezzi, A calculus for orchestration of web services, Journal of Applied Logic, vol.10, issue.1, pp.2-31, 2012.
DOI : 10.1016/j.jal.2011.11.002

P. Schnoebelen, Revisiting Ackermann-Hardness for Lossy Counter Machines and Reset Petri Nets, MFCS'10 : Mathematical Foundations of Computer Science, ser. LNCS, pp.616-628, 2010.
DOI : 10.1007/978-3-642-15155-2_54