A. Walsh, UDDI, SOAP, and WSDL: The Web Services Specification Reference Book, 2002.

M. B. Juric, Business Process Execution Language for Web Services BPEL and BPEL4WS 2nd Edition, 2006.

X. L. Guillou, M. O. Cordier, S. Robin, and L. Roze, Monitoring ws-cdl-based choreographies of web services, Proceedings of the 20th International Workshop on Principles of Diagnosis, pp.43-50, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00460684

E. Damiani, S. D. Di-vimercati, S. Paraboschi, and P. Samarati, Securing SOAP e-services, International Journal of Information Security, vol.1, issue.2, pp.100-115, 2002.
DOI : 10.1007/s102070100009

A. Sabelfeld and D. Sands, A Per Model of Secure Information Flow in Sequential Programs, Higher Order Symbolic Computation, vol.14, issue.1, pp.59-91, 2001.
DOI : 10.1007/3-540-49099-X_4

G. Smith and D. Volpano, Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.355-364, 1998.
DOI : 10.1145/268946.268975

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, 2003.
DOI : 10.1109/JSAC.2002.806121

URL : http://www.cs.cornell.edu/andru/papers/jsac/sm-jsac03.pdf

D. Mccullough, Noninterference and the composability of security properties, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.177-186, 1988.
DOI : 10.1109/SECPRI.1988.8110

J. Mclean, A general theory of composition for trace sets closed under selective interleaving functions, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, p.79, 1994.
DOI : 10.1109/RISP.1994.296590

A. Zakinthinos and E. S. Lee, A general theory of security properties, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.94-102, 1997.
DOI : 10.1109/SECPRI.1997.601322

H. Mantel, Possibilistic definitions of security-an assembly kit, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, p.185, 2000.
DOI : 10.1109/CSFW.2000.856936

N. B. Said, T. Abdellatif, S. Bensalem, and M. Bozga, A Model-Based Approach to Secure Multiparty Distributed Systems, Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques -7th International Symposium Proceedings, Part I, pp.893-908, 2016.
DOI : 10.1007/978-3-319-28934-2_6

B. Said, N. Abdellatif, T. Bensalem, S. Bozga, and M. , A robust framework for securing composed web services. In: FACS'15, Revised Selected Papers, LNCS, vol.9539, pp.105-122, 2016.

B. Said, N. Abdellatif, T. Bensalem, S. Bozga, and M. , Model-driven information flow security for component-based systems, ETAPS/FPS'14 Proceedings, pp.1-20, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01212303

R. Accorsi and A. Lehmann, Automatic Information Flow Analysis of Business Process Models, BPM'12 Proceedings, pp.172-187, 2012.
DOI : 10.1007/978-3-642-32885-5_13

URL : http://www.informatik.uni-freiburg.de/~accorsi/papers/bpm12.pdf

R. Focardi, S. Rossi, and A. Sabelfeld, Bridging Language-Based and Process Calculi Security, FOSSACS'05 Proceedings, pp.299-315, 2005.
DOI : 10.1007/978-3-540-31982-5_19

URL : http://www.informatics.sussex.ac.uk/research/projects/myths/reports/papers/focardiFOSSACS05.pdf

S. Frau, R. Gorrieri, and C. Ferigato, Petri net security checker: Structural non-interference at work. In: FAST'08 Proceedings, LNCS, vol.5491, pp.210-225, 2009.
DOI : 10.1007/978-3-642-01465-9_14

URL : http://www.cs.unibo.it/~gorrieri/Papers/fast08.pdf

B. Bonakdarpour, M. Bozga, M. Jaber, J. Quilbeuf, and J. Sifakis, Automated conflict-free distributed implementation of component-based models, International Symposium on Industrial Embedded System (SIES), pp.108-117, 2010.
DOI : 10.1109/SIES.2010.5551377

URL : https://hal.archives-ouvertes.fr/hal-00558046

S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers, Secure program partitioning, ACM Transactions on Computer Systems, vol.20, issue.3, 2002.
DOI : 10.1145/566340.566343

URL : http://www.cis.upenn.edu/~stevez/papers/./ZZNM02.ps

W. M. Van-der-aalst and K. B. Lassen, Translating workflow nets to bpel, p.techreport, 2005.

A. C. Myers and B. Liskov, Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, 2000.
DOI : 10.1109/fits.2003.1264929

URL : http://pag.csail.mit.edu/~mernst/teaching/6.893/readings/myers-tosem00.pdf

S. Chollet and P. Lalanda, Security Specification at Process Level, 2008 IEEE International Conference on Services Computing, pp.165-172, 2008.
DOI : 10.1109/SCC.2008.51

URL : https://hal.archives-ouvertes.fr/hal-00941715

D. A. Basin, J. Doser, and T. Lodderstedt, Model driven security, ACM Transactions on Software Engineering and Methodology, vol.15, issue.1, pp.39-91, 2006.
DOI : 10.1145/1125808.1125810

R. Accorsi and C. Wonnemann, Static information flow analysis of workflow models, Conference on Business Process and Service Computing, pp.194-205, 2010.

E. Goettelmann, Risk-aware Business Process Modelling and Trusted Deployment in the Cloud. Theses, 2015.
URL : https://hal.archives-ouvertes.fr/tel-01237669

A. Lifeng, T. Maolin, and F. Colin, Partitioning composite web services for decentralized execution using a genetic algorithm, Future Gener. Comput. Syst, 2011.

U. Yildiz and C. Godart, Centralized versus Decentralized Conversation-based Orchestrations, The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007), pp.23-26, 2007.
DOI : 10.1109/CEC-EEE.2007.28

URL : https://hal.archives-ouvertes.fr/inria-00167781

U. Yildiz and C. Godart, Information Flow Control with Decentralized Service Compositions, IEEE International Conference on Web Services (ICWS 2007), pp.9-17, 2007.
DOI : 10.1109/ICWS.2007.109

URL : https://hal.archives-ouvertes.fr/inria-00167780

R. Accorsi and C. Wonnemann, Static information flow analysis of workflow models, ISSS and BPSC'10 Proceedings, pp.194-205, 2010.

D. E. Denning and P. J. Denning, Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977.
DOI : 10.1145/359636.359712

J. Goguen, A. Meseguer, and J. , Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

N. Heintze and J. G. Riecke, The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.365-377, 1998.
DOI : 10.1145/268946.268976

D. M. Volpano, C. E. Irvine, and G. Smith, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-188, 1996.
DOI : 10.3233/JCS-1996-42-304

URL : http://www.cs.sunysb.edu/~stoller/cse592/volpano96sound.pdf

P. Laud, Semantics and Program Analysis of Computationally Secure Information Flow, ESOP'01 Proceedings, pp.77-91, 2001.
DOI : 10.1007/3-540-45309-1_6

URL : http://www.cs.uni-sb.de/~laud/esop2001.ps.gz

P. Adão and C. Fournet, Cryptographically Sound Implementations for Communicating Processes, ICALP'06 Proceedings, pp.83-94, 2006.
DOI : 10.1007/11787006_8

J. Courant, C. Ene, and Y. Lakhnech, Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption, FSTTCS'07 Proceedings, pp.364-375, 2007.
DOI : 10.1007/978-3-540-77050-3_30

P. Laud, On the computational soundness of cryptographically masked flows, POPL'08 Proceedings, pp.337-348, 2008.

C. Fournet and T. Rezk, Cryptographically sound implementations for typed information-flow security, POPL'08 Proceedings, pp.323-335, 2008.
DOI : 10.1145/1328897.1328478

URL : http://msr-inria.inria.fr/projects/sec/cflow/cryptographic-implementations-for-typed-information-flow-draft.pdf

S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers, Secure program partitioning, ACM Transactions on Computer Systems, vol.20, issue.3, pp.283-328, 2002.
DOI : 10.1145/566340.566343

URL : http://www.cis.upenn.edu/~stevez/papers/./ZZNM02.ps

C. Fournet, L. Guernic, G. Rezk, and T. , A security-preserving compiler for distributed programs, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.432-441, 2009.
DOI : 10.1145/1653662.1653715

N. Zeldovich, S. Boyd-wickizer, E. Kohler, and D. Mazì-eres, Making information flow explicit in HiStar, OSDI'06 Proceedings, Usenix Assoc, pp.263-278, 2006.
DOI : 10.1145/2018396.2018419

URL : http://www.lasr.cs.ucla.edu/classes/239_1.fall10/papers/p263-zeldovich.pdf

S. Vandebogart, P. Efstathopoulos, E. Kohler, M. N. Krohn, C. Frey et al., Mazì eres, D.: Labels and event processes in the Asbestos operating system, ACM Trans. Comput. Syst, vol.25, issue.4, 2007.

N. Zeldovich, S. Boyd-wickizer, and D. Mazì-eres, Securing distributed systems with information flow control, NSDI'08 Proceedings, Usenix Assoc, pp.293-308, 2008.

P. Parrend and S. Frénot, Security benchmarks of OSGi platforms: toward Hardened OSGi, Software: Practice and Experience, vol.22, issue.5, pp.471-499, 2009.
DOI : 10.1002/9780470061077

I. Kuz, Y. Liu, I. Gorton, and G. Heiser, CAmkES: A component model for secure microkernel-based embedded systems, Journal of Systems and Software, vol.80, issue.5, pp.687-699, 2007.
DOI : 10.1016/j.jss.2006.08.039

T. Abdellatif, L. Sfaxi, R. Robbana, and Y. Lakhnech, Automating information flow control in component-based distributed systems, Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, CBSE '11, pp.73-82, 2011.
DOI : 10.1145/2000229.2000241