Z. Anwar and R. H. Campbell, Automated Assessment of Critical Infrastructures for Compliance to CIP Best Practices In Second IFIP WG 11, 10 International Conference on Critical Infrastructure Protection, IFIP, 2008.

P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris et al., Xen and the art of virtualization, 2003.

J. Carroll, D. Reynolds, I. Dickinson, A. Seaborne, C. Dollin et al., Jena, Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters , WWW Alt. '04, 2004.
DOI : 10.1145/1013367.1013381

M. Castro, P. Druschel, A. Kermarrec, and A. Rowstron, Scribe: a large-scale and decentralized application-level multicast infrastructure, IEEE Journal on Selected Areas in communications, 2002.
DOI : 10.1109/JSAC.2002.803069

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.299

L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, 1982.
DOI : 10.1145/357172.357176

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.1697

S. Jajodia, S. Noel, and B. Berry, Topological analysis of network attack vulnerability, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, 2005.
DOI : 10.1145/1229285.1229288

M. Montanari and R. H. Campbell, Multi-aspect security configuration assessment, Proceedings of the 2nd ACM workshop on Assurable and usable security configuration, SafeConfig '09, 2009.
DOI : 10.1145/1655062.1655064

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.510.3267

M. Montanari, E. Chan, K. Larson, W. Yoo, and R. H. Campbell, Distributed Security Policy Conformance, 2011.
DOI : 10.1007/978-3-642-21424-0_17

URL : https://hal.archives-ouvertes.fr/hal-01567586

S. Narain, G. Levin, S. Malik, and V. , Declarative Infrastructure Configuration Synthesis and Debugging, Journal of Network and Systems Management, 2008.
DOI : 10.1007/s10922-008-9108-y

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.210.2650

X. Ou, W. Boyer, and M. Mcqueen, A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180446

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.468.1616

B. D. Payne, M. Carbone, and W. Lee, Secure and Flexible Monitoring of Virtual Machines, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007.
DOI : 10.1109/ACSAC.2007.10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.4958

A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, LNCS, 2001.
DOI : 10.1007/3-540-45518-3_18

URL : http://admis.fudan.edu.cn/member/yztang/Papers/P2P/overlay/Pastry Scalable, decentralized object location and routing for large scale p2p systems.pdf

A. Shieh, O. Kennedy, E. Sirer, and F. Schneider, NetQuery: A General-Purpose Channel for Reasoning about Network Properties, OSDI. USENIX, 2008.