S. Basu, T. Bultan, and M. Ouederni, Deciding choreography realizability, Proc. of POPL 2012, pp.191-202, 2012.
DOI : 10.1145/2103656.2103680

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. A. Bergstra and P. Klint, The discrete time ToolBus ??? A software coordination architecture, Science of Computer Programming, vol.31, issue.2-3, pp.205-229, 1998.
DOI : 10.1016/S0167-6423(97)00021-X

K. Bhargavan, R. Corin, P. M. Deniélou, C. Fournet, and J. J. Leifer, Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, pp.124-140, 2009.
DOI : 10.1109/CSF.2009.26

L. Bocchi, T. C. Chen, R. Demangeon, K. Honda, and N. Yoshida, Monitoring Networks through Multiparty Session Types, pp.50-65, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01213683

S. Bragaglia, F. Chesani, P. Mello, and D. Sottara, A Rule-Based Calculus and Processing of Complex Events, pp.151-166, 2012.
DOI : 10.1007/978-3-642-32689-9_12

M. Bravetti and G. Zavattaro, Towards a Unifying Theory for Choreography Conformance and Contract Compliance, Proc. of SC'07, pp.34-50, 2007.
DOI : 10.1007/978-3-540-77351-1_4

A. Bucchiarone, A. Marconi, M. Pistore, and H. Raik, Dynamic Adaptation of Fragment-Based and Context-Aware Business Processes, 2012 IEEE 19th International Conference on Web Services, pp.33-41, 2012.
DOI : 10.1109/ICWS.2012.56

S. Capecchi, I. Castellani, and M. Dezani-ciancaglini, Information flow safety in multiparty sessions, Proc. 18th EXPRESS, pp.16-30, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01237236

S. Capecchi, I. Castellani, M. Dezani-ciancaglini, and T. Rezk, Session Types for Access and Information Flow Control, pp.237-252, 2010.
DOI : 10.1007/978-3-642-15375-4_17

URL : https://hal.archives-ouvertes.fr/inria-00511304

M. Carbone, K. Honda, and N. Yoshida, Structured Communication-Centered Programming for Web Services, ACM Transactions on Programming Languages and Systems, vol.34, issue.2, 2012.
DOI : 10.1145/2220365.2220367

M. Carbone and F. Montesi, Deadlock-Freedom-by-Design: Multiparty Asynchronous Global Programming, Proc. of POPL 2013, pp.263-274, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00909320

G. Castagna, M. Dezani-ciancaglini, and L. Padovani, On Global Types and Multi-party Sessions, Logical Methods in Computer Science, vol.13, issue.4, 2012.
DOI : 10.1007/978-3-642-12032-9_10

URL : https://hal.archives-ouvertes.fr/hal-00694636

W. K. Chen, M. A. Hiltunen, and R. D. Schlichting, Constructing Adaptive Software in Distributed Systems, Proc. of ICDCS'01, pp.635-643, 2001.

D. Preda, M. Giacobazzi, R. Debray, S. K. Coogan, K. Townsend et al., Modelling metamorphism by abstract interpretation, Proc. of SAS10, pp.218-235, 2010.

D. Preda, M. Lanese, I. Mauro, J. Gabbrielli, M. Giallorenzo et al., Safe run-time adaptation of distributed systems, 2013.

M. Gabbrielli, S. Giallorenzo, and F. Montesi, Workflow patterns for coordinating heterogeneous networks, 2013.

C. Ghezzi, M. Pradella, and G. Salvaneschi, An evaluation of the adaptation capabilities in programming languages, Proceeding of the 6th international symposium on Software engineering for adaptive and self-managing systems, SEAMS '11, pp.50-59, 2011.
DOI : 10.1145/1988008.1988016

R. Giacobazzi and I. Mastroeni, Abstract non-interference: parameterizing non-interference by abstract interpretation, Proc. ACM SIGPLAN-SIGACT, POPL 2004, pp.186-197, 2004.

R. Giacobazzi and I. Mastroeni, Adjoining classified and unclassified information by abstract interpretation, Journal of Computer Security, vol.18, issue.5, pp.751-797, 2010.
DOI : 10.3233/JCS-2009-0382

S. Goetz and I. Savga, Exploring Role Based Adaptation, pp.21-26, 2008.

S. González, K. Mens, M. Colacioiu, and W. Cazzola, Context traits, Proceedings of the 12th annual international conference on Aspect-oriented software development, AOSD '13, pp.209-220, 2013.
DOI : 10.1145/2451436.2451461

P. Klint, T. Van-der-storm, and J. J. Vinju, RASCAL: A Domain Specific Language for Source Code Analysis and Manipulation, 2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, pp.168-177, 2009.
DOI : 10.1109/SCAM.2009.28

M. Kolundzija, Security Types for Sessions and Pipelines, Proc. of WS-FM 2008, pp.175-190, 2008.
DOI : 10.3233/JCS-1996-42-304

R. Kowalski and M. Sergot, A logic-based calculus of events, New Generation Computing, vol.10, issue.No. 2, pp.67-95, 1986.
DOI : 10.1007/BF03037383

I. Lanese, A. Bucchiarone, and F. Montesi, A Framework for Rule-Based Dynamic Adaptation, Proc. of TGC 2010, pp.284-300, 2010.
DOI : 10.1007/978-3-642-15640-3_19

L. Leite, A. Oliva, G. Nogueira, G. Gerosa, M. Kon et al., A systematic literature review of service choreography adaptation, Service Oriented Computing and Applications, pp.1-18, 2012.
DOI : 10.1007/s11761-012-0125-z

F. Montesi, C. Guidi, and G. Zavattaro, Composing Services with JOLIE, Fifth European Conference on Web Services (ECOWS'07), pp.13-22, 2007.
DOI : 10.1109/ECOWS.2007.19

J. Planul, R. Corin, and C. Fournet, Secure Enforcement for Global Process Specifications, Proc. of CONCUR 2009, pp.511-526, 2009.
DOI : 10.1007/BFb0053567

. Scribble, Scribble website, 2013.

Z. Yang, B. H. Cheng, R. E. Stirewalt, J. Sowell, S. M. Sadjadi et al., An aspect-oriented approach to dynamic adaptation, Proceedings of the first workshop on Self-healing systems , WOSS '02, pp.85-92, 2002.
DOI : 10.1145/582128.582144

J. Zhang, H. Goldsby, and B. H. Cheng, Modular verification of dynamically adaptive systems, Proceedings of the 8th ACM international conference on Aspect-oriented software development, AOSD '09, pp.161-172, 2009.
DOI : 10.1145/1509239.1509262