PICCOLA?a small composition language In: Formal methods for distributed processing, pp.403-426, 2001. ,
Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.563-574, 2004. ,
DOI : 10.1145/1007568.1007632
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.8664
Context-based e-health system access control mechanism Advances in information security and its application pp, pp.68-77, 2009. ,
DOI : 10.1007/978-3-642-02633-1_9
Web Services: Concepts, Architectures and Applications, 2004. ,
DOI : 10.1007/978-3-662-10876-5
Aws customer agreement ,
Overview of Amazon Web Services, 2010. ,
Business Process Execution Language for Web Services (BPEL4WS), Version 1, 2003. ,
ContextJ: Contextoriented programming with java, Computer Software, vol.28, issue.1, 2011. ,
The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010. ,
DOI : 10.1016/j.comnet.2010.05.010
Space-aware ambients and processes, Theoretical Computer Science, vol.373, issue.1-2, pp.41-69, 2007. ,
DOI : 10.1016/j.tcs.2006.11.017
URL : http://doi.org/10.1016/j.tcs.2006.11.017
A Type Inference Algorithm for Secure Ambients, Electronic Notes in Theoretical Computer Science, vol.62, pp.83-101, 2001. ,
DOI : 10.1016/S1571-0661(04)00321-4
URL : http://doi.org/10.1016/s1571-0661(04)00321-4
Planning and verifying service composition, Journal of Computer Security, vol.17, issue.5, pp.799-837, 2009. ,
DOI : 10.3233/JCS-2009-0357
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.1077
Semantics-Based Design for Secure Web Services, IEEE Transactions on Software Engineering, vol.34, issue.1, pp.33-49, 2008. ,
DOI : 10.1109/TSE.2007.70740
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.3687
Local policies for resource usage analysis, ACM Transactions on Programming Languages and Systems, vol.31, issue.6, p.31, 2009. ,
DOI : 10.1145/1552309.1552313
LocUsT: a tool for checking usage policies, 2008. ,
DOI : 10.1007/978-3-642-00945-7_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.1671
Service Combinators for Farming Virtual Machines, Lecture Notes in Computer Science, vol.5052, pp.33-49, 2008. ,
DOI : 10.1007/978-3-540-68265-3_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.629
Security Protocol Verification: Symbolic and Computational Models, pp.3-29, 2012. ,
DOI : 10.1007/978-3-642-28641-4_2
URL : https://hal.archives-ouvertes.fr/hal-00863388
Safer in the Clouds (Extended Abstract), Electronic Proceedings in Theoretical Computer Science, vol.38, pp.45-49, 2010. ,
DOI : 10.4204/EPTCS.38.6
Predicting global usages of resources endowed with local policies, Electronic Proceedings in Theoretical Computer Science, vol.58, pp.49-64, 2011. ,
DOI : 10.4204/EPTCS.58.4
Typechecking Safe Process Synchronization, Proc. Foundations of Global Ubiquitous Computing. ENTCS, 2005. ,
DOI : 10.1016/j.entcs.2005.05.002
URL : http://doi.org/10.1016/j.entcs.2005.05.002
SCC: A Service Centered Calculus, WS-FM. Springer LNCS, 2006. ,
DOI : 10.1007/11841197_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.9186
Flow-sensitive Leakage Analysis in Mobile Ambients, Electronic Notes in Theoretical Computer Science, vol.128, issue.5, pp.17-25, 2005. ,
DOI : 10.1016/j.entcs.2004.11.039
URL : http://doi.org/10.1016/j.entcs.2004.11.039
Security boundaries in mobile ambients, Computer Languages, Systems & Structures, vol.28, issue.1, pp.101-127, 2002. ,
DOI : 10.1016/S0096-0551(02)00009-7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.7410
Adaptable Processes (Extended Abstract), Lecture Notes in Computer Science, vol.266, issue.1-2, pp.90-105, 2011. ,
DOI : 10.1007/978-3-642-12032-9_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.8039
Behavioural Types and Component Adaptation, Proc. Algebraic Methodology and Software Technology (AMAST). Springer LNCS, 2004. ,
DOI : 10.1007/978-3-540-27815-3_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.5376
Calculi for Service-Oriented Computing, Lecture Notes in Computer Science, vol.5569, pp.1-41, 2009. ,
DOI : 10.1007/978-3-642-01918-0_1
A Conceptual Framework for Adaptation, Lecture Notes in Computer Science, vol.7212, pp.240-254, 2012. ,
DOI : 10.1007/978-3-642-28872-2_17
Secure Data Flow in a Calculus for Context Awareness, Concurrency, Graphs and Models, pp.439-456, 2008. ,
DOI : 10.1007/978-3-540-68679-8_27
Reasoning about Security in Mobile Ambients, Lecture Notes in Computer Science, vol.2154, pp.102-120, 2001. ,
DOI : 10.1007/3-540-44685-0_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.802
Core Calculi for Service-Oriented Computing, pp.153-188, 2011. ,
DOI : 10.1023/A:1022883727209
Towards Security and Privacy for Pervasive Computing, Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems ISSS'02, pp.1-15, 2003. ,
DOI : 10.1007/3-540-36532-X_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3007
Structured Communication-Centred Programming for Web Services, European Symposium in Programming Languages (ESOP), 2007. ,
DOI : 10.1007/978-3-540-71316-6_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.902
Mobile ambients, Foundations of Software Science and Computation Structures, pp.140-155, 1998. ,
DOI : 10.1007/BFb0053547
A survey of context-aware mobile computing research, Tech. rep., Dartmouth College, 2000. ,
An ontology for context-aware pervasive computing environments, The Knowledge Engineering Review, vol.18, issue.3, pp.197-207, 2003. ,
DOI : 10.1017/S0269888904000025
Software engineering for self-adaptive systems: A research roadmap In: Software Engineering for Self-Adaptive Systems, Lecture Notes in Computer Science, vol.5525, pp.1-26, 2009. ,
DOI : 10.1007/978-3-642-02161-9
Event based choreography, Science of Computer Programming, vol.75, issue.10, pp.848-878, 2010. ,
DOI : 10.1016/j.scico.2010.02.009
URL : http://doi.org/10.1016/j.scico.2010.02.009
How should context-escaping closures proceed?, International Workshop on Context-Oriented Programming, COP '09, pp.1-1, 2009. ,
DOI : 10.1145/1562112.1562113
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.138
A semantics for context-oriented programming with layers, International Workshop on Context-Oriented Programming, COP '09, pp.1-10, 2009. ,
DOI : 10.1145/1562112.1562122
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.1428
Language constructs for context-oriented programming, Proceedings of the 2005 conference on Dynamic languages symposium , DLS '05, pp.1-10, 2005. ,
DOI : 10.1145/1146841.1146842
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.9313
The next step in Web services, Communications of the ACM, vol.46, issue.10, 2003. ,
DOI : 10.1145/944217.944234
A Language-Based Approach to Autonomic Computing, Lecture Notes in Computer Science, vol.75, issue.6, 2011. ,
DOI : 10.1007/11498094_17
Typing Context-Dependent Behavioural Variation, PLACES 2012, 2012. ,
DOI : 10.4204/EPTCS.109.5
URL : http://arxiv.org/abs/1302.6332
Typing for coordinating secure behavioural variations. In: Coordination Models and Languages, Lecture Notes in Computer Science, vol.7274, 2012. ,
DOI : 10.1007/978-3-642-30829-1_18
Towards a cross???context identity management framework in e???health, Online Information Review, vol.33, issue.3, pp.422-442, 2009. ,
DOI : 10.1109/ARES.2008.20
Decidability of model checking for infinite-state concurrent systems, Acta Informatica, vol.34, issue.2, pp.85-107, 1997. ,
DOI : 10.1007/s002360050074
JSCL: A Middleware for Service Coordination, Proc. FORTE. Springer LNCS, 2006. ,
DOI : 10.1007/978-3-642-58041-3_6
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592
Everyware: The dawning age of ubiquitous computing, 2006. ,
An ontology-based context model in intelligent environments, Proceedings of communication networks and distributed systems modeling and simulation conference, pp.270-275, 2004. ,
SOCK: A Calculus for Service Oriented Computing, Proc. Service-Oriented Computing (ICSOC) ,
DOI : 10.1007/11948148_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.6297
Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006. ,
DOI : 10.1145/1111596.1111601
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4161
Security challenges in the ip-based internet of things. Wireless Personal Communications pp, pp.1-16, 2011. ,
Context-oriented Programming., The Journal of Object Technology, vol.7, issue.3, pp.125-151, 2008. ,
DOI : 10.5381/jot.2008.7.3.a4
ContextFJ, Proceedings of the 10th international workshop on Foundations of aspect-oriented languages, FOAL '11, pp.19-23, 2011. ,
DOI : 10.1145/1960510.1960515
Language primitives and type discipline for structured communication-based programming. Programming Languages and Systems pp, pp.122-138, 1998. ,
DOI : 10.1007/bfb0053567
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3650
Context sensitive access control, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.111-119, 2005. ,
DOI : 10.1145/1063979.1064000
Featherweight Java: a minimal core calculus for Java and GJ, ACM Transactions on Programming Languages and Systems, vol.23, issue.3, pp.396-450, 2001. ,
DOI : 10.1145/503502.503505
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.1141
EventCJ, Proceedings of the tenth international conference on Aspect-oriented software development, AOSD '11, pp.253-264, 2011. ,
DOI : 10.1145/1960275.1960305
Web Service Coreography Description Language. http:// www.w3.org/TR/ws-cdl-10/ 71. Kelly, L.: The security threats of technology ubiquity ,
Service oriented composition in BPEL4WS, Proc. WWW, 2003. ,
A Calculus for Orchestration of Web Services, European Symposium in Programming Languages (ESOP), 2007. ,
DOI : 10.1007/978-3-540-71316-6_4
Encoding Requests to Web Service Compositions as Constraints, Proc. Principles and Practice of Constraint Programming (CP). Springer LNCS, 2005. ,
DOI : 10.1007/11564751_64
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.963
Mobile safe ambients, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.1-69, 2003. ,
DOI : 10.1145/596980.596981
Formalisation and Implementation of the XACML Access Control Mechanism, ESSoS. Lecture Notes in Computer Science, vol.7159, pp.60-74, 2012. ,
DOI : 10.1007/978-3-642-28166-2_7
A programming model for the orchestration of web services, Proceedings of the Second International Conference on Software Engineering and Formal Methods, 2004. SEFM 2004., 2004. ,
DOI : 10.1109/SEFM.2004.1347498
Can homomorphic encryption be practical?, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.113-124, 2011. ,
DOI : 10.1145/2046660.2046682
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.8007
Service-oriented computing: concepts, characteristics and directions, Proceedings of the 7th International Conference on Properties and Applications of Dielectric Materials (Cat. No.03CH37417), p.WISE, 2003. ,
DOI : 10.1109/WISE.2003.1254461
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.323.9432
SERVICE-ORIENTED COMPUTING: A RESEARCH ROADMAP, International Journal of Cooperative Information Systems, vol.44, issue.02, pp.223-255, 2008. ,
DOI : 10.1142/S0218843008001816
Special issue on service oriented computing, Communications of the ACM, vol.46, issue.10, 2003. ,
Opportunistic networking: data forwarding in disconnected mobile ad hoc networks, IEEE Communications Magazine, vol.44, issue.11, pp.134-141, 2006. ,
DOI : 10.1109/MCOM.2006.248176
Security in computing, 2003. ,
Gaia, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, issue.4, pp.65-67, 2002. ,
DOI : 10.1145/643550.643558
The Pi-Calculus -a theory of mobile processes, 2001. ,
Context-aware computing applications, Proceedings of the Workshop on Mobile Computing Systems and Applications, pp.85-90, 1994. ,
DOI : 10.1109/mcsa.1994.512740
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.5833
Types and trace effects of higher order programs, Journal of Functional Programming, vol.5, issue.02, pp.179-249, 2008. ,
DOI : 10.1145/353323.353382
Web services: beyond component-based computing, Communications of the ACM, vol.45, issue.10, 2002. ,
DOI : 10.1145/570907.570934
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
Security and Privacy Challenges in Cloud Computing Environments, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.24-31, 2010. ,
DOI : 10.1109/MSP.2010.186
Typing the behaviours of objects and components using session types, Proc. of FOCLASA, 2002. ,
An automata-theoretic approach to automatic program verification (preliminary report), pp.332-344, 1986. ,
DOI : 10.1007/3-540-50403-6_33
Seal: A Framework for Secure Mobile Computations, Internet Programming Languages. Lecture Notes in Computer Science, vol.1686, pp.47-77, 1998. ,
DOI : 10.1007/3-540-47959-7_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.6470
Web services are not distributed objects, IEEE Internet Computing, vol.7, issue.6, 2003. ,
DOI : 10.1109/MIC.2003.1250585
Ontology based context modeling and reasoning using owl, Pervasive Computing and Communications Workshops Proceedings of the Second IEEE Annual Conference on, pp.18-22, 2004. ,
Internet of Things ? New security and privacy challenges, Computer Law & Security Review, vol.26, issue.1, pp.23-30, 2010. ,
DOI : 10.1016/j.clsr.2009.11.008
Rigorous Software Engineering for Service- Oriented Systems -Results of the SENSORIA Project on Software Engineering for Service-Oriented Computing, Lecture Notes in Computer Science, vol.6582, 2011. ,
Context-aware security and secure context-awareness in ubiquitous computing environments, 2005. ,
A Game-Theoretic Analysis of Cooperation in Anonymity Networks, Lecture Notes in Computer Science, vol.7215, pp.269-289, 2012. ,
DOI : 10.1007/978-3-642-28641-4_15
URL : https://hal.archives-ouvertes.fr/hal-00760445
Dynamic context-aware access control for grid applications, Proceedings. First Latin American Web Congress, pp.101-108, 2003. ,
DOI : 10.1109/GRID.2003.1261704
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.6396