J. Abrial, Formal methods: Theory becoming practice, J. UCS, vol.13, issue.5, pp.619-628, 2007.

R. De-nicola, G. L. Ferrari, and R. Pugliese, KLAIM: a kernel language for agents interaction and mobility, IEEE Transactions on Software Engineering, vol.24, issue.5, 1998.
DOI : 10.1109/32.685256

C. Dwork, Differential privacy In Encyclopedia of Cryptography and Security, pp.338-340, 2011.

C. A. Hoare, Communicating Sequential Processes, 1985.

E. Kuhn and T. Ludwig, VIP-MDBS: A Logic Multidatabase System, Proceedings [1988] International Symposium on Databases in Parallel and Distributed Systems, pp.190-201
DOI : 10.1109/DPDS.1988.675015

E. Kühn, A. K. Elmagarmid, Y. Leu, and N. Boudriga, A parallel logic language for transaction specification in multidatabase systems, Journal of Systems Integration, vol.21, issue.3, pp.219-252, 1995.
DOI : 10.1007/BF01974950

L. Lourenço and L. Caires, Information flow analysis for valued-indexed data security compartments, Trustworthy Global Computing -8th International Symposium, TGC 2013, pp.180-198, 2013.

G. D. Plotkin, A structural approach to operational semantics, J. Log. Algebr. Program, pp.60-6117, 2004.

M. Madhan, R. Thirukonda, and . Menezes, On the use of linda as a framework for distributed database systems, 2002.

K. Terkel, F. Tolstrup, R. Nielson, and . Hansen, Locality-based security policies, Formal Aspects in Security and Trust, Fourth International Workshop, pp.185-201, 2006.

J. Woodcock, P. G. Larsen, J. Bicarregui, and J. S. Fitzgerald, Formal methods, ACM Computing Surveys, vol.41, issue.4, 2009.
DOI : 10.1145/1592434.1592436

M. Moshé and . Zloof, Query by example, Proceedings of the National Computer Conference and Exposition, AFIPS '75, pp.431-438, 1975.