R. Alur and D. L. Dill, A theory of timed automata, Theoretical Computer Science, vol.126, issue.2, pp.183-235, 1994.
DOI : 10.1016/0304-3975(94)90010-8

R. Alur, Timed Automata, 11th International Conference on Computer Aided Verification, pp.8-22, 1999.
DOI : 10.1007/3-540-48683-6_3

K. Altisen, F. Maraninchi, and D. Stauch, Aspect-oriented programming for reactive systems: Larissa, a proposal in the synchronous framework, Science of Computer Programming, vol.63, issue.3, pp.297-320, 2006.
DOI : 10.1016/j.scico.2005.12.001

W. Binder, J. G. Hulaas, and A. Villaz, Portable resource control in java, OOPSLA '01: Proceedings of the 16th ACM SIGPLAN conference on Object oriented programming, systems, languages, and applications, pp.139-155, 2001.

J. Bengtsson and W. Yi, Timed Automata: Semantics, Algorithms and Tools, Lectures on Concurrency and Petri Nets, pp.87-124, 2003.
DOI : 10.1007/978-3-540-27755-2_3

T. Colcombet and P. Fradet, Enforcing trace properties by program transformation, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, pp.54-66, 2000.
DOI : 10.1145/325694.325703

URL : https://hal.archives-ouvertes.fr/inria-00000937

C. [. Cuppens and . Saurel, Towards a formalization of availability and denial of service, Inf. Syst. Tech. Panel Symp. on Protecting Nato Information Systems in the 21st century, 1999.

R. Douence, P. Fradet, and M. Südholt, A Framework for the Detection and Resolution of Aspect Interactions, Proc. of Conference on Generative Programming and Component Engineering (GPCE'02), pp.173-188, 2002.
DOI : 10.1007/3-540-45821-2_11

URL : https://hal.archives-ouvertes.fr/inria-00000950

R. Douence, P. Fradet, and M. Südholt, Trace-based aspects, Aspect-Oriented Software Development, pp.201-217, 2004.
URL : https://hal.archives-ouvertes.fr/inria-00000947

P. Fradet and S. Ha, Network Fusion, Prog. Lang. and Syst.: Second Asian Symposium, (APLAS'04), pp.21-40, 2004.
DOI : 10.1007/978-3-540-30477-7_3

URL : https://hal.archives-ouvertes.fr/inria-00000945

P. Fradet and S. Ha, Syst??mes de gestion de ressources et aspects de disponibilit??, 2 e Journée sur le Développement de Logiciels Par Aspects, 2005.
DOI : 10.3166/objet.12.2-3.183-210

P. Fradet and S. Ha, Systèmes de gestion de ressources et aspects de disponibilité. L'Objet -Logiciel, bases de données, pp.183-210, 2006.

P. Fradet and S. Ha, Aspects of availability, Proc. of the sixth international conference on generative programming and component engineering (GPCE'07), pp.165-174, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00666293

D. Van-horn and H. G. Mairson, Relating complexity and precision in control flow analysis, ICFP '07: Proceedings of the 12th ACM SIGPLAN international conference on Functional programming, pp.85-96, 2007.

S. Hong and T. Ha, Programmation par aspects et tissage de propriétés. Applicationà Applicationà l'ordonnancement etàetà la disponibilité, 2007.

G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm et al., An Overview of AspectJ, Lecture Notes in Computer Science, vol.2072, pp.327-355, 2001.
DOI : 10.1007/3-540-45337-7_18

J. Laprie, Dependability: Basic Concepts and Terminology. Dependable Computing and Fault-Tolerant Systems, 1992.

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005.
DOI : 10.1007/s10207-004-0046-8

X. Li, T. Mitra, and A. Roychoudhury, Modeling Control Speculation for Timing Analysis, Real-Time Systems, vol.29, issue.1, pp.27-58, 2005.
DOI : 10.1023/B:TIME.0000048933.15922.f9

P. Kim-guldstrand-larsen, W. Pettersson, and . Yi, Uppaal in a nutshell, International Journal on Software Tools for Technology Transfer, vol.1, issue.1-2, pp.134-152, 1997.
DOI : 10.1007/s100090050010

J. Leiwo and Y. Zheng, A method to implement a denial of service protection base, ACISP '97: Proceedings of the Second Australasian Conference on Information Security and Privacy, pp.90-101, 1997.
DOI : 10.1007/BFb0027946

J. K. Millen, A Resource Allocation Model for Denial of Service Protection, Journal of Computer Security, vol.2, issue.2-3, 1994.
DOI : 10.3233/JCS-1993-22-303

V. , K. Nandivada, and J. Palsberg, Timing analysis of TCP servers for surviving denial-of-service attacks, IEEE Real-Time and Embedded Technology and Applications Symp, pp.541-549, 2005.

P. Puschner, . Ch, and . Koza, Calculating the maximum, execution time of real-time programs . Real-Time Syst, pp.159-176, 1989.

B. Regnell, K. Kimbler, and A. Wesslen, Improving the use case driven approach to requirements engineering, Proceedings of 1995 IEEE International Symposium on Requirements Engineering (RE'95), pp.40-48, 1995.
DOI : 10.1109/ISRE.1995.512544

J. Rushby, Critical system properties: Survey and taxonomy. Reliability Engineering and Systems Safety, pp.189-219, 1994.

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.1-50, 2000.

R. [. Somé, J. Dssouli, and . Vaucher, From scenarios to timed automata: building specifications from users requirements, Proceedings 1995 Asia Pacific Software Engineering Conference, pp.48-57, 1995.
DOI : 10.1109/APSEC.1995.496953

H. Sipma, A formal model for cross-cutting modular transition systems, Workshop on Foundations of Aspect-Oriented Languages, 2003.

C. Yu and V. D. Gligor, A specification and verification method for preventing denial of service, IEEE Transactions on Software Engineering, vol.16, issue.6, pp.581-592, 1990.
DOI : 10.1109/32.55087