D. Arsenault, A. Sood, and Y. Huang, Secure, resilient computing clusters: Selfcleansing intrusion tolerance with hardware enforced security (scit/hes), The Second International Conference on Availability, Reliability and Security (ARES'07), pp.343-350, 2007.

P. Beaucamps, D. Reynaud, J. Y. Marion, and E. Filiol, On the impact of malware on internet voting, 1st Luxembourg Day on security and reliability, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00425584

A. R. Cavalli, A. M. Ortiz, G. Ouffoué, C. A. Sanchez, and F. Zaïdi, Design of a secure shield for internet and web-based services using software reflection, In Web Services -ICWS, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02017535

S. Estehghari and Y. Desmedt, Exploiting the client vulnerabilities in internet e-voting systems: Hacking helios 2.0 as an example, Proceedings of the 2010 International Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, pp.1-9, 2010.

M. Ficco and M. Rak, Intrusion tolerant approach for denial of service attacks to web services, Proceedings of the 2011 First International Conference on Data Compression, Communications and Processing, CCP '11, pp.285-292, 2011.

T. Furtado, E. Francesquini, N. Lago, and F. Kon, A middleware for reflective web service choreographies on the cloud, Proceedings of the 13th Workshop on Adaptive and Reflective Middleware, ARM '14, vol.9, pp.1-9, 2014.

M. Hennessy and H. Lin, Symbolic bisimulations, Theor. Comput. Sci, vol.138, issue.2, pp.353-389, 1995.

B. B. Madan and K. S. Trivedi, Security modeling and quantification of intrusion tolerant systems using attack-response graph, Journal of High Speed Networks, vol.13, issue.4, pp.297-308, 2004.

. Huu-nghia-nguyen, Une Approche Symbolique pour la Vérification et le Test des Chorégraphies de Services, 2013.

D. O'brien, R. Smith, T. Kappel, and C. Bitzer, Intrusion tolerance via network layer controls, Proceedings DARPA Information Survivability Conference and Exposition, vol.1, pp.90-96, 2003.

S. Pavel, J. Noyé, P. Poizat, and J. Royer, A java implementation of a component model with explicit symbolic protocols, Software Composition, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00342152

Z. Qiu, X. Zhao, C. Cai, and H. Yang, Towards the Theoretical Foundation of Choreography, Proc. of WWW'07, 2007.

B. Sadegh and M. A. Azgomi, A new architecture for intrusion-tolerant web services based on design diversity techniques, Journal of Information Systems and Telecommunication, 2015.

P. Sousa, A. Bessani, N. F. Neves, and R. Obelheiro, The forever service for fault/intrusion removal, Proceedings of the 2Nd Workshop on Recent Advances on Intrusiton-tolerant Systems, WRAITS '08, vol.5, pp.1-5, 2008.

P. Sousa, A. N. Bessani, M. Correia, N. F. Neves, and P. Verissimo, Resilient intrusion tolerance through proactive and reactive recovery, 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007), pp.373-380, 2007.

A. Valdes, M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre et al., An architecture for an adaptive intrusion-tolerant server, Security Protocols, 10th International Workshop, pp.158-178, 2002.

A. Valdes, M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre et al., An architecture for an adaptive intrusion-tolerant server, Security Protocols, pp.158-178, 2004.

P. E. Verissimo, N. F. Neves, C. Cachin, J. Poritz, D. Powell et al., Intrusion-tolerant middleware: the road to automatic security, IEEE Security Privacy, vol.4, issue.4, pp.54-62, 2006.

F. Wang, U. Raghavendra, and C. Killian, Analysis of techniques for building intrusion tolerant server systems, IEEE Military Communications Conference (MILCOM), vol.2, pp.729-734, 2003.