F. Achermann, M. Lumpe, J. Schneider, and O. Nierstrasz, PICCOLA?a small composition language In: Formal methods for distributed processing, pp.403-426, 2001.

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.563-574, 2004.
DOI : 10.1145/1007568.1007632

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.8664

F. Al-neyadi and J. Abawajy, Context-based e-health system access control mechanism Advances in information security and its application pp, pp.68-77, 2009.
DOI : 10.1007/978-3-642-02633-1_9

G. Alonso, F. Casati, H. Kuno, and V. Machiraju, Web Services: Concepts, Architectures and Applications, 2004.
DOI : 10.1007/978-3-662-10876-5

. Amazon and . Com-inc, Aws customer agreement

. Amazon and . Com-inc, Overview of Amazon Web Services, 2010.

T. Andrews, Business Process Execution Language for Web Services (BPEL4WS), Version 1, 2003.

M. Appeltauer, R. Hirschfeld, M. Haupt, and H. Masuhara, ContextJ: Contextoriented programming with java, Computer Software, vol.28, issue.1, 2011.

L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010.
DOI : 10.1016/j.comnet.2010.05.010

F. Barbanera, M. Bugliesi, M. Dezani-ciancaglini, and V. Sassone, Space-aware ambients and processes, Theoretical Computer Science, vol.373, issue.1-2, pp.41-69, 2007.
DOI : 10.1016/j.tcs.2006.11.017

URL : http://doi.org/10.1016/j.tcs.2006.11.017

F. Barbanera, M. Dezani-ciancaglini, I. Salvo, and V. Sassone, A Type Inference Algorithm for Secure Ambients, Electronic Notes in Theoretical Computer Science, vol.62, pp.83-101, 2001.
DOI : 10.1016/S1571-0661(04)00321-4

URL : http://doi.org/10.1016/s1571-0661(04)00321-4

M. Bartoletti, P. Degano, and G. L. Ferrari, Planning and verifying service composition, Journal of Computer Security, vol.17, issue.5, pp.799-837, 2009.
DOI : 10.3233/JCS-2009-0357

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.1077

M. Bartoletti, P. Degano, G. L. Ferrari, and R. Zunino, Semantics-Based Design for Secure Web Services, IEEE Transactions on Software Engineering, vol.34, issue.1, pp.33-49, 2008.
DOI : 10.1109/TSE.2007.70740

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.3687

M. Bartoletti, P. Degano, G. L. Ferrari, and R. Zunino, Local policies for resource usage analysis, ACM Transactions on Programming Languages and Systems, vol.31, issue.6, p.31, 2009.
DOI : 10.1145/1552309.1552313

M. Bartoletti and R. Zunino, LocUsT: a tool for checking usage policies, 2008.
DOI : 10.1007/978-3-642-00945-7_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.1671

K. Bhargavan, A. D. Gordon, and I. Narasamdya, Service Combinators for Farming Virtual Machines, Lecture Notes in Computer Science, vol.5052, pp.33-49, 2008.
DOI : 10.1007/978-3-540-68265-3_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.629

B. Blanchet, Security Protocol Verification: Symbolic and Computational Models, pp.3-29, 2012.
DOI : 10.1007/978-3-642-28641-4_2

URL : https://hal.archives-ouvertes.fr/hal-00863388

C. Bodei, V. D. Dinh, and G. L. Ferrari, Safer in the Clouds (Extended Abstract), Electronic Proceedings in Theoretical Computer Science, vol.38, pp.45-49, 2010.
DOI : 10.4204/EPTCS.38.6

C. Bodei, V. D. Dinh, and G. L. Ferrari, Predicting global usages of resources endowed with local policies, Electronic Proceedings in Theoretical Computer Science, vol.58, pp.49-64, 2011.
DOI : 10.4204/EPTCS.58.4

E. Bonelli, A. Compagnoni, and E. Gunter, Typechecking Safe Process Synchronization, Proc. Foundations of Global Ubiquitous Computing. ENTCS, 2005.
DOI : 10.1016/j.entcs.2005.05.002

URL : http://doi.org/10.1016/j.entcs.2005.05.002

M. Boreale, SCC: A Service Centered Calculus, WS-FM. Springer LNCS, 2006.
DOI : 10.1007/11841197_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.9186

C. Braghin and A. Cortesi, Flow-sensitive Leakage Analysis in Mobile Ambients, Electronic Notes in Theoretical Computer Science, vol.128, issue.5, pp.17-25, 2005.
DOI : 10.1016/j.entcs.2004.11.039

URL : http://doi.org/10.1016/j.entcs.2004.11.039

C. Braghin, A. Cortesi, and R. Focardi, Security boundaries in mobile ambients, Computer Languages, Systems & Structures, vol.28, issue.1, pp.101-127, 2002.
DOI : 10.1016/S0096-0551(02)00009-7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.7410

M. Bravetti, C. D. Giusto, J. A. Pérez, G. Zavattaro, . Fmoods et al., Adaptable Processes (Extended Abstract), Lecture Notes in Computer Science, vol.266, issue.1-2, pp.90-105, 2011.
DOI : 10.1007/978-3-642-12032-9_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.8039

A. Brogi, C. Canal, and E. Pimentel, Behavioural Types and Component Adaptation, Proc. Algebraic Methodology and Software Technology (AMAST). Springer LNCS, 2004.
DOI : 10.1007/978-3-540-27815-3_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.5376

R. Bruni, Calculi for Service-Oriented Computing, Lecture Notes in Computer Science, vol.5569, pp.1-41, 2009.
DOI : 10.1007/978-3-642-01918-0_1

R. Bruni, A. Corradini, F. Gadducci, A. Lluch-lafuente, and A. Vandin, A Conceptual Framework for Adaptation, Lecture Notes in Computer Science, vol.7212, pp.240-254, 2012.
DOI : 10.1007/978-3-642-28872-2_17

D. Bucur and M. Nielsen, Secure Data Flow in a Calculus for Context Awareness, Concurrency, Graphs and Models, pp.439-456, 2008.
DOI : 10.1007/978-3-540-68679-8_27

M. Bugliesi, G. Castagna, and S. Crafa, Reasoning about Security in Mobile Ambients, Lecture Notes in Computer Science, vol.2154, pp.102-120, 2001.
DOI : 10.1007/3-540-44685-0_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.802

L. Caires, R. De-nicola, R. Pugliese, V. T. Vasconcelos, and G. Zavattaro, Core Calculi for Service-Oriented Computing, pp.153-188, 2011.
DOI : 10.1023/A:1022883727209

R. Campbell, J. Al-muhtadi, P. Naldurg, G. Sampemane, and M. D. Mickunas, Towards Security and Privacy for Pervasive Computing, Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems ISSS'02, pp.1-15, 2003.
DOI : 10.1007/3-540-36532-X_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3007

M. Carbone, K. Honda, and N. Yoshida, Structured Communication-Centred Programming for Web Services, European Symposium in Programming Languages (ESOP), 2007.
DOI : 10.1007/978-3-540-71316-6_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.902

L. Cardelli and A. Gordon, Mobile ambients, Foundations of Software Science and Computation Structures, pp.140-155, 1998.
DOI : 10.1007/BFb0053547

G. Chen and D. Kotz, A survey of context-aware mobile computing research, Tech. rep., Dartmouth College, 2000.

H. Chen, T. Finin, and A. Joshi, An ontology for context-aware pervasive computing environments, The Knowledge Engineering Review, vol.18, issue.3, pp.197-207, 2003.
DOI : 10.1017/S0269888904000025

B. H. Cheng, Software engineering for self-adaptive systems: A research roadmap In: Software Engineering for Self-Adaptive Systems, Lecture Notes in Computer Science, vol.5525, pp.1-26, 2009.
DOI : 10.1007/978-3-642-02161-9

V. Ciancia, G. L. Ferrari, R. Guanciale, and D. Strollo, Event based choreography, Science of Computer Programming, vol.75, issue.10, pp.848-878, 2010.
DOI : 10.1016/j.scico.2010.02.009

URL : http://doi.org/10.1016/j.scico.2010.02.009

D. Clarke, P. Costanza, and E. Tanter, How should context-escaping closures proceed?, International Workshop on Context-Oriented Programming, COP '09, pp.1-1, 2009.
DOI : 10.1145/1562112.1562113

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.138

D. Clarke and I. Sergey, A semantics for context-oriented programming with layers, International Workshop on Context-Oriented Programming, COP '09, pp.1-10, 2009.
DOI : 10.1145/1562112.1562122

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.1428

P. Costanza, Language constructs for context-oriented programming, Proceedings of the 2005 conference on Dynamic languages symposium , DLS '05, pp.1-10, 2005.
DOI : 10.1145/1146841.1146842

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.9313

F. Curbera, R. Khalaf, N. Mukhi, S. Tai, and S. Weerawarane, The next step in Web services, Communications of the ACM, vol.46, issue.10, 2003.
DOI : 10.1145/944217.944234

D. Nicola, R. Ferrari, G. Loreti, M. Pugliese, and R. , A Language-Based Approach to Autonomic Computing, Lecture Notes in Computer Science, vol.75, issue.6, 2011.
DOI : 10.1007/11498094_17

P. Degano, G. L. Ferrari, L. Galletta, and G. Mezzetti, Typing Context-Dependent Behavioural Variation, PLACES 2012, 2012.
DOI : 10.4204/EPTCS.109.5

URL : http://arxiv.org/abs/1302.6332

P. Degano, G. L. Ferrari, L. Galletta, and G. Mezzetti, Typing for coordinating secure behavioural variations. In: Coordination Models and Languages, Lecture Notes in Computer Science, vol.7274, 2012.
DOI : 10.1007/978-3-642-30829-1_18

M. Deng, D. D. Cock, and B. Preneel, Towards a cross???context identity management framework in e???health, Online Information Review, vol.33, issue.3, pp.422-442, 2009.
DOI : 10.1109/ARES.2008.20

J. Esparza, Decidability of model checking for infinite-state concurrent systems, Acta Informatica, vol.34, issue.2, pp.85-107, 1997.
DOI : 10.1007/s002360050074

G. Ferrari, R. Guanciale, and D. Strollo, JSCL: A Middleware for Service Coordination, Proc. FORTE. Springer LNCS, 2006.
DOI : 10.1007/978-3-642-58041-3_6

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592

A. Greenfield, Everyware: The dawning age of ubiquitous computing, 2006.

T. Gu, X. Wang, H. Pung, and D. Zhang, An ontology-based context model in intelligent environments, Proceedings of communication networks and distributed systems modeling and simulation conference, pp.270-275, 2004.

C. Guidi, R. Lucchi, R. Gorrieri, N. Busi, and G. Zavattaro, SOCK: A Calculus for Service Oriented Computing, Proc. Service-Oriented Computing (ICSOC)
DOI : 10.1007/11948148_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.6297

K. W. Hamlen, J. G. Morrisett, and F. B. Schneider, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006.
DOI : 10.1145/1111596.1111601

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4161

T. Heer, O. Garcia-morchon, R. Hummen, S. Keoh, S. Kumar et al., Security challenges in the ip-based internet of things. Wireless Personal Communications pp, pp.1-16, 2011.

R. Hirschfeld, P. Costanza, and O. Nierstrasz, Context-oriented Programming., The Journal of Object Technology, vol.7, issue.3, pp.125-151, 2008.
DOI : 10.5381/jot.2008.7.3.a4

R. Hirschfeld, A. Igarashi, and H. Masuhara, ContextFJ, Proceedings of the 10th international workshop on Foundations of aspect-oriented languages, FOAL '11, pp.19-23, 2011.
DOI : 10.1145/1960510.1960515

K. Honda, V. Vasconcelos, and M. Kubo, Language primitives and type discipline for structured communication-based programming. Programming Languages and Systems pp, pp.122-138, 1998.
DOI : 10.1007/bfb0053567

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3650

R. Hulsebosch, A. Salden, M. Bargh, P. Ebben, and J. Reitsma, Context sensitive access control, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.111-119, 2005.
DOI : 10.1145/1063979.1064000

A. Igarashi, B. C. Pierce, and P. Wadler, Featherweight Java: a minimal core calculus for Java and GJ, ACM Transactions on Programming Languages and Systems, vol.23, issue.3, pp.396-450, 2001.
DOI : 10.1145/503502.503505

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.1141

T. Kamina, T. Aotani, and H. Masuhara, EventCJ, Proceedings of the tenth international conference on Aspect-oriented software development, AOSD '11, pp.253-264, 2011.
DOI : 10.1145/1960275.1960305

N. Kavantza, Web Service Coreography Description Language. http:// www.w3.org/TR/ws-cdl-10/ 71. Kelly, L.: The security threats of technology ubiquity

R. Khalaf, N. Mukhi, and S. Weerawarana, Service oriented composition in BPEL4WS, Proc. WWW, 2003.

A. Lapadula, R. Pugliese, and F. Tiezzi, A Calculus for Orchestration of Web Services, European Symposium in Programming Languages (ESOP), 2007.
DOI : 10.1007/978-3-540-71316-6_4

A. Lazovik, M. Aiello, and R. Gennari, Encoding Requests to Web Service Compositions as Constraints, Proc. Principles and Practice of Constraint Programming (CP). Springer LNCS, 2005.
DOI : 10.1007/11564751_64

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.963

F. Levi and D. Sangiorgi, Mobile safe ambients, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.1-69, 2003.
DOI : 10.1145/596980.596981

M. Masi, R. Pugliese, and F. Tiezzi, Formalisation and Implementation of the XACML Access Control Mechanism, ESSoS. Lecture Notes in Computer Science, vol.7159, pp.60-74, 2012.
DOI : 10.1007/978-3-642-28166-2_7

J. Misra, A programming model for the orchestration of web services, Proceedings of the Second International Conference on Software Engineering and Formal Methods, 2004. SEFM 2004., 2004.
DOI : 10.1109/SEFM.2004.1347498

M. Naehrig, K. Lauter, and V. Vaikuntanathan, Can homomorphic encryption be practical?, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.113-124, 2011.
DOI : 10.1145/2046660.2046682

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.8007

M. P. Papazoglou, Service-oriented computing: concepts, characteristics and directions, Proceedings of the 7th International Conference on Properties and Applications of Dielectric Materials (Cat. No.03CH37417), p.WISE, 2003.
DOI : 10.1109/WISE.2003.1254461

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.323.9432

M. P. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann, SERVICE-ORIENTED COMPUTING: A RESEARCH ROADMAP, International Journal of Cooperative Information Systems, vol.44, issue.02, pp.223-255, 2008.
DOI : 10.1142/S0218843008001816

M. Papazouglou and D. Georgakopoulos, Special issue on service oriented computing, Communications of the ACM, vol.46, issue.10, 2003.

L. Pelusi, A. Passarella, and M. Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks, IEEE Communications Magazine, vol.44, issue.11, pp.134-141, 2006.
DOI : 10.1109/MCOM.2006.248176

C. Pfleeger and S. Pfleeger, Security in computing, 2003.

M. Román, C. Hess, R. Cerqueira, A. Ranganathan, R. Campbell et al., Gaia, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, issue.4, pp.65-67, 2002.
DOI : 10.1145/643550.643558

D. Sangiorgi and D. Walker, The Pi-Calculus -a theory of mobile processes, 2001.

B. Schilit, N. Adams, and R. Want, Context-aware computing applications, Proceedings of the Workshop on Mobile Computing Systems and Applications, pp.85-90, 1994.
DOI : 10.1109/mcsa.1994.512740

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.5833

C. Skalka, S. Smith, and D. V. Horn, Types and trace effects of higher order programs, Journal of Functional Programming, vol.5, issue.02, pp.179-249, 2008.
DOI : 10.1145/353323.353382

M. Stal, Web services: beyond component-based computing, Communications of the ACM, vol.45, issue.10, 2002.
DOI : 10.1145/570907.570934

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002.
DOI : 10.1109/RISP.1993.287632

H. Takabi, J. Joshi, and G. Ahn, Security and Privacy Challenges in Cloud Computing Environments, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.24-31, 2010.
DOI : 10.1109/MSP.2010.186

A. Vallecillo, V. Vansconcelos, and A. Ravara, Typing the behaviours of objects and components using session types, Proc. of FOCLASA, 2002.

M. Y. Vardi and P. Wolper, An automata-theoretic approach to automatic program verification (preliminary report), pp.332-344, 1986.
DOI : 10.1007/3-540-50403-6_33

J. Vitek and G. Castagna, Seal: A Framework for Secure Mobile Computations, Internet Programming Languages. Lecture Notes in Computer Science, vol.1686, pp.47-77, 1998.
DOI : 10.1007/3-540-47959-7_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.6470

W. Vogels, Web services are not distributed objects, IEEE Internet Computing, vol.7, issue.6, 2003.
DOI : 10.1109/MIC.2003.1250585

X. Wang, D. Zhang, T. Gu, and H. Pung, Ontology based context modeling and reasoning using owl, Pervasive Computing and Communications Workshops Proceedings of the Second IEEE Annual Conference on, pp.18-22, 2004.

R. Weber, Internet of Things ? New security and privacy challenges, Computer Law & Security Review, vol.26, issue.1, pp.23-30, 2010.
DOI : 10.1016/j.clsr.2009.11.008

M. Wirsing and M. M. Hölzl, Rigorous Software Engineering for Service- Oriented Systems -Results of the SENSORIA Project on Software Engineering for Service-Oriented Computing, Lecture Notes in Computer Science, vol.6582, 2011.

K. Wrona and L. Gomez, Context-aware security and secure context-awareness in ubiquitous computing environments, 2005.

M. Yang, V. Sassone, and S. Hamadou, A Game-Theoretic Analysis of Cooperation in Anonymity Networks, Lecture Notes in Computer Science, vol.7215, pp.269-289, 2012.
DOI : 10.1007/978-3-642-28641-4_15

URL : https://hal.archives-ouvertes.fr/hal-00760445

G. Zhang and M. Parashar, Dynamic context-aware access control for grid applications, Proceedings. First Latin American Web Congress, pp.101-108, 2003.
DOI : 10.1109/GRID.2003.1261704

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.6396