R. Fielding, Architectural styles and the design of network-based software architectures " Doctoral dissertation, 2000.

D. Box, G. Kavivaya, A. Layman, S. Thatte, and D. Winer, SOAP: Simple Object Access Protocol " , in Internet Draft draft-box-http-soap-01, 1999.

P. W. Arzberger, P. Schroeder, A. Beaulieu, G. C. Bowker, K. Casey et al., Promoting Access to Public Research Data for Scientific, Economic, and Social Development, Data Science Journal, vol.3, issue.29, pp.135-152, 2004.
DOI : 10.1126/science.1095958

URL : http://doi.org/10.2481/dsj.3.135

T. Davies, Open data, democracy and public sector reform. A look at open government data use from data.gov, 2010.

J. C. Molloy, The Open Knowledge Foundation: Open Data Means Better Science, PLoS Biology, vol.3, issue.12, p.1001195, 2011.
DOI : 10.1371/journal.pbio.1001195.g001

URL : http://doi.org/10.1371/journal.pbio.1001195

M. Samwald, A. Jentzsch, C. Bouton, S. Kallesøe, C. Willighagen et al., Linked open drug data for pharmaceutical research and development, Journal of Cheminformatics, vol.3, issue.1, pp.19-29, 2011.
DOI : 10.1186/1758-2946-2-7

URL : http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3121711

A. M. Zuiderwijk, K. G. Jeffery, and M. F. Janssen, The potential of metadata for linked open data and its value for users and publishers. JeDEM-e-Journal of e-Democracy and Open Government, 2012.

M. Janssen, Y. Charalabidis, and A. Zuiderwijk, Benefits, Adoption Barriers and Myths of Open Data and Open Government, Information Systems Management, vol.28, issue.3, pp.258-268, 2012.
DOI : 10.1080/10580530.2012.716740

M. Kassen, A promising phenomenon of open data: A case study of the Chicago open data project, Government Information Quarterly, vol.30, issue.4, pp.508-513, 2013.
DOI : 10.1016/j.giq.2013.05.012

A. Zuiderwijk and M. Janssen, Open data policies, their implementation and impact: A framework for comparison, Government Information Quarterly, vol.31, issue.1, pp.17-29, 2014.
DOI : 10.1016/j.giq.2013.04.003

H. Jaakkola, T. Makinen, and A. Etelaaho, Open data, Proceedings of the 15th International Conference on Computer Systems and Technologies, CompSysTech '14, pp.3038-3084, 1997.
DOI : 10.1145/2659532.2659594

J. N. Mazon, J. J. Zubcoff, I. Garrig, and R. Espinosa, Open business intelligence, Proceedings of the 2012 Joint EDBT/ICDT Workshops on, EDBT-ICDT '12, 2012.
DOI : 10.1145/2320765.2320812

K. C. Telikicherla and V. Choppella, Enabling the development of safer mashups for open data, Proceedings of the 1st International Workshop on Inclusive Web Programming, Programming on the Web with Open Data for Societal Applications, IWP 2014, 2014.
DOI : 10.1145/2593761.2593764

K. Eckert, D. Ritze, K. Baierer, and C. Bizer, RESTful open workflows for data provenance and reuse, Proceedings of the 23rd International Conference on World Wide Web, WWW '14 Companion, 2014.
DOI : 10.1145/2567948.2577347

A. Socrata-open-data, http://www.socrata.com/industries/open-data-state-local- government

C. Comerford and P. Soderling, Why REST security doesn't exist? " . http://www.computerworld.com/s/article Web Services Security: SOAP Message Security 1, 2006.

D. Forsberg, RESTful Security In Web 2.0 Security & Privacy, conjunction with 2009 IEEE Symposium on Security and Privacy, 2009.

D. Peng-;-chen-li-;-huan and . Huo, An extended UsernameToken-based approach for REST-style Web Service Security Authentication, 2nd IEEE International Conference on, pp.582-590, 2009.

G. Serme, A. S. De-oliveira, J. Massiera, and Y. Roudier, Enabling Message Security for RESTful Services, 2012 IEEE 19th International Conference on Web Services, pp.24-29, 2012.
DOI : 10.1109/ICWS.2012.94

H. Lee and M. R. Mehta, Defense against REST-based web service attacks for enterprise systems, Communications of the IIMA, pp.57-68, 2013.

F. De-backere, B. Hanssens, R. Heynssens, R. Houthooft, A. Zuliani et al., Design of a security mechanism for RESTful Web Service communication through mobile clients, 2014 IEEE Network Operations and Management Symposium (NOMS), pp.5-9, 2014.
DOI : 10.1109/NOMS.2014.6838308

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

L. M. Kohnfelder, Towards a practical public-key cryptosystem, PhD diss., Massachusetts Institute of Technology, 1978.

R. Clarke, Conventional public key infrastructure: An artefact ill-fitted to the needs of the information society, Proceedings of the 9th European Conference on Information Systems, 2001.

R. L. Rivest, Can we eliminate certificate revocation lists?, Financial Cryptography, pp.178-183, 1998.
DOI : 10.1007/BFb0055482

P. Mcdaniel and A. Rubin, A Response to ???Can We Eliminate Certificate Revocation Lists????, In Financial Cryptography, pp.245-258, 2001.
DOI : 10.1007/3-540-45472-1_17

D. Wendlandt, D. G. Andersen, and A. Perrig, Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing, Proceedings of the USENIX 2008 Annual Technical Conference, 2008.

M. Marlinspike, SSL and the Future of Authenticity, 2011.