UDDI, SOAP, and WSDL: The Web Services Specification Reference Book, 2002. ,
Business Process Execution Language for Web Services BPEL and BPEL4WS 2nd Edition, 2006. ,
Monitoring ws-cdl-based choreographies of web services, Proceedings of the 20th International Workshop on Principles of Diagnosis, pp.43-50, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00460684
Securing SOAP e-services, International Journal of Information Security, vol.1, issue.2, pp.100-115, 2002. ,
DOI : 10.1007/s102070100009
A Per Model of Secure Information Flow in Sequential Programs, Higher Order Symbolic Computation, vol.14, issue.1, pp.59-91, 2001. ,
DOI : 10.1007/3-540-49099-X_4
Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.355-364, 1998. ,
DOI : 10.1145/268946.268975
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, 2003. ,
DOI : 10.1109/JSAC.2002.806121
URL : http://www.cs.cornell.edu/andru/papers/jsac/sm-jsac03.pdf
Noninterference and the composability of security properties, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.177-186, 1988. ,
DOI : 10.1109/SECPRI.1988.8110
A general theory of composition for trace sets closed under selective interleaving functions, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, p.79, 1994. ,
DOI : 10.1109/RISP.1994.296590
A general theory of security properties, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.94-102, 1997. ,
DOI : 10.1109/SECPRI.1997.601322
Possibilistic definitions of security-an assembly kit, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, p.185, 2000. ,
DOI : 10.1109/CSFW.2000.856936
A Model-Based Approach to Secure Multiparty Distributed Systems, Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques -7th International Symposium Proceedings, Part I, pp.893-908, 2016. ,
DOI : 10.1007/978-3-319-28934-2_6
A robust framework for securing composed web services. In: FACS'15, Revised Selected Papers, LNCS, vol.9539, pp.105-122, 2016. ,
Model-driven information flow security for component-based systems, ETAPS/FPS'14 Proceedings, pp.1-20, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01212303
Automatic Information Flow Analysis of Business Process Models, BPM'12 Proceedings, pp.172-187, 2012. ,
DOI : 10.1007/978-3-642-32885-5_13
URL : http://www.informatik.uni-freiburg.de/~accorsi/papers/bpm12.pdf
Bridging Language-Based and Process Calculi Security, FOSSACS'05 Proceedings, pp.299-315, 2005. ,
DOI : 10.1007/978-3-540-31982-5_19
URL : http://www.informatics.sussex.ac.uk/research/projects/myths/reports/papers/focardiFOSSACS05.pdf
Petri net security checker: Structural non-interference at work. In: FAST'08 Proceedings, LNCS, vol.5491, pp.210-225, 2009. ,
DOI : 10.1007/978-3-642-01465-9_14
URL : http://www.cs.unibo.it/~gorrieri/Papers/fast08.pdf
Automated conflict-free distributed implementation of component-based models, International Symposium on Industrial Embedded System (SIES), pp.108-117, 2010. ,
DOI : 10.1109/SIES.2010.5551377
URL : https://hal.archives-ouvertes.fr/hal-00558046
Secure program partitioning, ACM Transactions on Computer Systems, vol.20, issue.3, 2002. ,
DOI : 10.1145/566340.566343
URL : http://www.cis.upenn.edu/~stevez/papers/./ZZNM02.ps
Translating workflow nets to bpel, p.techreport, 2005. ,
Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, 2000. ,
DOI : 10.1109/fits.2003.1264929
URL : http://pag.csail.mit.edu/~mernst/teaching/6.893/readings/myers-tosem00.pdf
Security Specification at Process Level, 2008 IEEE International Conference on Services Computing, pp.165-172, 2008. ,
DOI : 10.1109/SCC.2008.51
URL : https://hal.archives-ouvertes.fr/hal-00941715
Model driven security, ACM Transactions on Software Engineering and Methodology, vol.15, issue.1, pp.39-91, 2006. ,
DOI : 10.1145/1125808.1125810
Static information flow analysis of workflow models, Conference on Business Process and Service Computing, pp.194-205, 2010. ,
Risk-aware Business Process Modelling and Trusted Deployment in the Cloud. Theses, 2015. ,
URL : https://hal.archives-ouvertes.fr/tel-01237669
Partitioning composite web services for decentralized execution using a genetic algorithm, Future Gener. Comput. Syst, 2011. ,
Centralized versus Decentralized Conversation-based Orchestrations, The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007), pp.23-26, 2007. ,
DOI : 10.1109/CEC-EEE.2007.28
URL : https://hal.archives-ouvertes.fr/inria-00167781
Information Flow Control with Decentralized Service Compositions, IEEE International Conference on Web Services (ICWS 2007), pp.9-17, 2007. ,
DOI : 10.1109/ICWS.2007.109
URL : https://hal.archives-ouvertes.fr/inria-00167780
Static information flow analysis of workflow models, ISSS and BPSC'10 Proceedings, pp.194-205, 2010. ,
Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977. ,
DOI : 10.1145/359636.359712
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.365-377, 1998. ,
DOI : 10.1145/268946.268976
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-188, 1996. ,
DOI : 10.3233/JCS-1996-42-304
URL : http://www.cs.sunysb.edu/~stoller/cse592/volpano96sound.pdf
Semantics and Program Analysis of Computationally Secure Information Flow, ESOP'01 Proceedings, pp.77-91, 2001. ,
DOI : 10.1007/3-540-45309-1_6
URL : http://www.cs.uni-sb.de/~laud/esop2001.ps.gz
Cryptographically Sound Implementations for Communicating Processes, ICALP'06 Proceedings, pp.83-94, 2006. ,
DOI : 10.1007/11787006_8
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption, FSTTCS'07 Proceedings, pp.364-375, 2007. ,
DOI : 10.1007/978-3-540-77050-3_30
On the computational soundness of cryptographically masked flows, POPL'08 Proceedings, pp.337-348, 2008. ,
Cryptographically sound implementations for typed information-flow security, POPL'08 Proceedings, pp.323-335, 2008. ,
DOI : 10.1145/1328897.1328478
URL : http://msr-inria.inria.fr/projects/sec/cflow/cryptographic-implementations-for-typed-information-flow-draft.pdf
Secure program partitioning, ACM Transactions on Computer Systems, vol.20, issue.3, pp.283-328, 2002. ,
DOI : 10.1145/566340.566343
URL : http://www.cis.upenn.edu/~stevez/papers/./ZZNM02.ps
A security-preserving compiler for distributed programs, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.432-441, 2009. ,
DOI : 10.1145/1653662.1653715
Making information flow explicit in HiStar, OSDI'06 Proceedings, Usenix Assoc, pp.263-278, 2006. ,
DOI : 10.1145/2018396.2018419
URL : http://www.lasr.cs.ucla.edu/classes/239_1.fall10/papers/p263-zeldovich.pdf
Mazì eres, D.: Labels and event processes in the Asbestos operating system, ACM Trans. Comput. Syst, vol.25, issue.4, 2007. ,
Securing distributed systems with information flow control, NSDI'08 Proceedings, Usenix Assoc, pp.293-308, 2008. ,
Security benchmarks of OSGi platforms: toward Hardened OSGi, Software: Practice and Experience, vol.22, issue.5, pp.471-499, 2009. ,
DOI : 10.1002/9780470061077
CAmkES: A component model for secure microkernel-based embedded systems, Journal of Systems and Software, vol.80, issue.5, pp.687-699, 2007. ,
DOI : 10.1016/j.jss.2006.08.039
Automating information flow control in component-based distributed systems, Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, CBSE '11, pp.73-82, 2011. ,
DOI : 10.1145/2000229.2000241