H. Mouratidis and P. Giorgini, Integrating Security and Software Engineering: Advances and Future Vision, 2006.
DOI : 10.4018/978-1-59904-147-6

J. Viega, J. T. Bloch, and P. Chandra, Applying Aspect-Oriented Programming to Security, Cutter IT Journal, vol.14, issue.2, pp.31-39, 2001.

G. Georg, I. Ray, K. Anastasakis, B. Bordbar, M. Toahchoodee et al., An aspect-oriented methodology for designing secure applications, Special Issue: Model-Driven Development for Secure Information Systems, pp.846-864, 2009.
DOI : 10.1016/j.infsof.2008.05.004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.526

D. Mouheb, C. Talhi, M. Nouh, V. Lima, M. Debbabi et al., Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML, of Studies in Computational Intelligence, pp.197-213, 2010.
DOI : 10.1007/978-3-642-13273-5_13

W. P. Stevens, G. J. Myers, and L. L. Constantine, Structured design, IBM Systems Journal, vol.13, issue.2, pp.115-139, 1974.
DOI : 10.1147/sj.132.0115

F. A. Kraemer, Engineering Reactive Systems: A Compositional and Model-Driven Method Based on Collaborative Building Blocks, 2008.

F. A. Kraemer and P. Herrmann, Automated Encapsulation of UML Activities for Incremental Development and Verification, Proceedings of the 12th Int. Conference on Model Driven Engineering, Languages and Systems (MoDELS), 2009.
DOI : 10.1007/3-540-45102-1_14

F. A. Kraemer and P. Herrmann, Reactive Semantics for Distributed UML Activities, LNCS, vol.6117, pp.17-31, 2010.
DOI : 10.1007/978-3-642-13464-7_3

URL : https://hal.archives-ouvertes.fr/hal-01055149

F. A. Kraemer, V. Slåtten, and P. Herrmann, Tool support for the rapid composition, analysis and implementation of reactive services, Journal of Systems and Software, vol.82, issue.12, pp.2068-2080, 2009.
DOI : 10.1016/j.jss.2009.06.057

E. Gamma, R. Helm, R. E. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, 1995.

E. Hammer-lahav, The OAuth 2.0 Authorization Protocol, Internet-Draft, pp.2-22, 2011.

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, RFC, vol.5246, 2008.
DOI : 10.17487/rfc5246

A. Melnikov and K. Zeilenga, Simple Authentication and Security Layer (SASL), RFCProposed Standard), vol.4422, 2006.
DOI : 10.17487/rfc4422

S. Cantor, Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) v2, 2005.

F. A. Kraemer and P. Herrmann, Transforming Collaborative Service Specifications into Efficiently Executable State Machines, Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT, 2007.

F. A. Kraemer, P. Herrmann, and R. Braek, Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services, Proceedings of the 8th International Symposium on Distributed Objects and Applications (DOA), pp.1613-1632, 2006.
DOI : 10.1007/11914952_41

V. Slåtten and P. Herrmann, Contracts for Multi-instance UML Activities, pp.304-318, 2011.
DOI : 10.1007/3-540-48153-2_6

M. Abadi and L. Lamport, The existence of refinement mappings, Theoretical Computer Science, vol.82, issue.2, pp.253-284, 1991.
DOI : 10.1016/0304-3975(91)90224-P

J. Jürjens and S. H. Houmb, Dynamic Secure Aspect Modeling with UML: From Models to Code, International Conference on Model Driven Engineering Languages and Systems, MoDELS 2005, pp.142-155, 2005.
DOI : 10.1007/11557432_11

J. Pavlich-mariscal, L. Michel, and S. Demurjian, Enchancing UML to Model Custom Security Aspects, AOM '07: Proceedings of the 11th Workshop on Aspect- Oriented Modeling, 2007.

J. M. Jézéquel, Model driven design and aspect weaving, Software & Systems Modeling, vol.33, issue.4, pp.209-218, 2008.
DOI : 10.1007/s10270-008-0080-5

R. T. Alexander and J. M. Bieman, Challenges of Aspect-oriented Technology, Workshop on Software Quality, 24th Int'l Conf. Software Engineering, 2002.

J. Jürjens, Secure System Development with UML, 2004.

D. Basin, J. Doser, and T. Lodderstedt, Model driven security, ACM Transactions on Software Engineering and Methodology, vol.15, issue.1, pp.39-91, 2006.
DOI : 10.1145/1125808.1125810

T. Doan, S. Demurjian, T. C. Ting, and A. Ketterl, MAC and UML for secure software design, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.75-85, 2004.
DOI : 10.1145/1029133.1029144

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.1628