R. Affeldt and N. Kobayashi, Formalization and Verification of a Mail Server in Coq, ISSS, pp.217-233, 2003.
DOI : 10.1007/3-540-36532-X_14

D. Akhawe, A. Barth, P. E. Lam, J. C. Mitchell, and D. Song, Towards a Formal Foundation of Web Security, 2010 23rd IEEE Computer Security Foundations Symposium, pp.290-304, 2010.
DOI : 10.1109/CSF.2010.27

A. Barth, C. Jackson, and J. C. Mitchell, Securing frame communication in browsers, Proc. of 17th USENIX Security Symposium, 2008.
DOI : 10.1145/1516046.1516066

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

K. Bhargavan, C. Fournet, and A. D. Gordon, Verified Reference Implementations of WS-Security Protocols, Proc. of 3rd WS- FM, pp.88-106, 2006.
DOI : 10.1007/11841197_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. Chetali and Q. H. Nguyen, Industrial Use of Formal Methods for a High-Level Security Evaluation, Proc. of 15th Intl. Symposium on Formal Methods, pp.198-213, 2008.
DOI : 10.1007/978-3-540-68237-0_15

X. Fu, T. Bultan, and J. Su, WSAT: A Tool for Formal Analysis of Web Services, Proc. of 16th Int. Conf. on Computer Aided Verification, pp.510-514
DOI : 10.1007/978-3-540-27813-9_48

G. Platform, GlobalPlatform Card Specification 2.2 -Remote Application Management over HTTP -Amendment B, version 0, 2008.

M. Haydar, A. Petrenko, and H. Sahraoui, Formal Verification of Web Applications Modeled by Communicating Automata, Proc. of FORTE 2004, pp.115-132, 2004.
DOI : 10.1109/WSE.2002.1134088

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. C. Mitchell, V. Shmatikov, and U. Stern, Finite-state analysis of ssl 3.0, Proc. of 7th USENIX Security Symposium, pp.201-216, 1998.

A. W. Roscoe, Modelling and verifying key-exchange protocols using CSP and FDR, Proceedings The Eighth IEEE Computer Security Foundations Workshop, pp.98-107, 1995.
DOI : 10.1109/CSFW.1995.518556

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Shegalov and G. Weikum, Formal Verification of Web Service Interaction Contracts, 2008 IEEE International Conference on Services Computing, pp.525-528, 2008.
DOI : 10.1109/SCC.2008.67