D. Boneh and M. K. Franklin, Identity-Based Encryption from the Weil Pairing, Advances in Cryptology -Crypto'2001, pp.213-229, 2001.
DOI : 10.1007/3-540-44647-8_13

X. Chen, F. Zhang, and K. Kim, A new ID-based group signature scheme from bilinear pairings, Information Security Applications, 4th International Workshop -WISA'03, pp.585-592, 2003.

A. Dearle, G. Kirby, A. Mccarthy, and J. D. Carballo, A Flexible and Secure Deployment Framework for Distributed Applications, In Lecture Notes in Computer Science, vol.3083, pp.219-233, 2004.
DOI : 10.1007/978-3-540-24848-4_15

C. Ellison and B. Schneier, Ten risks of pki: What you're not being told about public key infrastructure, Computer Security Journal, vol.16, issue.1, 2000.

M. Gaedke, J. Meinecke, and M. Nussbaumer, Supporting Secure Deployment of Portal Components, ICWE 2004, number 3140 in LNCS, pp.516-520, 2004.
DOI : 10.1007/978-3-540-27834-4_62

R. Housley, Cryptographic message syntax (cms)
DOI : 10.17487/rfc5652

Y. Kim, C. Moon, D. Park, and D. Baik, A mac-based service bundle authentication mechanism in the osgi service platform, DASFAA, 2004.

H. Lim, Y. Kim, C. Moon, and D. Baik, Bundle authentication and authorization using xml security in the osgi service platform, ICIS '05: Proceedings of the Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05), pp.502-507, 2005.

C. Low and J. Guijarro, A smartfrog tutorial, 2006.

M. Mont, P. Bramhall, and K. Harrison, A flexible role-based secure messaging service: exploiting IBE technology for privacy in health care, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., pp.432-437, 2003.
DOI : 10.1109/DEXA.2003.1232060

. Osgi-alliance, Osgi service platform, core specification release 4. Draft, 2005.

P. Parrend and S. Frenot, Secure component deployment in the osgi(tm) release 4 platform, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00084795

P. Parrend and S. Frenot, Supporting the Secure Deployment of OSGi Bundles, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007.
DOI : 10.1109/WOWMOM.2007.4351681

URL : https://hal.archives-ouvertes.fr/inria-00275186

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Proceedings of CRYPTO 84 on Advances in cryptology, pp.47-53, 1985.
DOI : 10.1007/3-540-39568-7_5

T. Stading, Secure communication in a distributed system using identity based encryption, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings., pp.414-420, 2003.
DOI : 10.1109/CCGRID.2003.1199395

X. Wang and H. Yu, How to Break MD5 and Other Hash Functions, Lecture Notes in Computer Science, vol.3494, pp.19-35, 2001.
DOI : 10.1007/11426639_2