W. Arbaugh, D. Farber, and J. Smith, A secure and reliable bootstrap architecture, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.65-71, 1997.
DOI : 10.1109/SECPRI.1997.601317

A. Banerjee and D. Naumann, A simple semantics and static analysis for java security, 2001.

M. Bartoletti, P. Degano, and G. Ferrari, Static analysis for eager stack inspection, Workshop on Formal Techniques for Java-like Programs, 2003.
DOI : 10.1016/s1571-0661(04)00236-1

URL : http://doi.org/10.1016/s1571-0661(04)00236-1

M. Bartoletti, Language-based security: access control and static analysis, 2005.

M. Bartoletti, P. Degano, and G. L. Ferrari, Stack inspection and secure program transformations, International Journal of Information Security, vol.9, issue.3-4, pp.187-217, 2004.
DOI : 10.1145/363516.363520

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Bieber and J. Carpenter, Introduction to service-oriented programming (rev 2.1) OpenWings Whitepaper, 2001.

B. Chang, Static check analysis for Java stack inspection, ACM SIGPLAN Notices, vol.41, issue.3, pp.40-48, 2006.
DOI : 10.1145/1140543.1140550

D. Dean and W. Felten, Java security: from HotJava to Netscape and beyond, Proceedings 1996 IEEE Symposium on Security and Privacy, 1996.
DOI : 10.1109/SECPRI.1996.502681

L. Gong and R. Schemers, Implementing protection domains in the java development kit 1.2, Network and Distributed System Security Symposium, 1998.

L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers, Going beyond the sandbox: An overview of the new security architecture in the java development kit 1.2, Proceedings of the USENIX Symposium on Internet Technologies and Systems, 1997.

T. Lindholm and F. Yellin, The Java(TM) Virtual Machine Specification, 1999.

. Osgi-alliance, Osgi service platform, core specification release 4. Draft, 2005.

P. Parrend and S. Frenot, Java components vulnerabilities -an experimental classification targeted at the osgi platform, p.6, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00157341

P. Parrend and S. Frenot, Supporting the Secure Deployment of OSGi Bundles, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007.
DOI : 10.1109/WOWMOM.2007.4351681

URL : https://hal.archives-ouvertes.fr/inria-00275186

M. Takesue, A Scheme for Protecting the Information Leakage Via Portable Devices, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007), 2007.
DOI : 10.1109/SECUREWARE.2007.4385310

D. S. Wallach, A New Approach to Mobile Code Security, 1999.

D. S. Wallach, A. W. Appel, and E. W. Felten, SAFKASI: a security mechanism for language-based systems, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.341-378, 2000.
DOI : 10.1145/363516.363520

K. Andrew, M. Wright, and . Felleisen, A syntactic approach to type soundness, Information and Computation, vol.115, issue.1, pp.38-94, 1994.