R. Accorsi, On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems, IFIP, vol.201, pp.329-339, 2006.
DOI : 10.1007/0-387-33406-8_28

R. Anderson and T. Moore, Information security economics ? and beyond Information Security Summit (IS2), 2009.

A. R. Arasteh, M. Debbabi, A. Sakha, and M. Saleh, Analyzing multiple logs for forensic evidence, Digital Investigation, pp.82-91, 2007.
DOI : 10.1016/j.diin.2007.06.013

A. Avizienis, J. Laprie, and B. Randell, Fundamental concepts of computer system dependability, IARP/IEEE-RAS Workshop on Robot Dependability: Technological Challenge of Dependable Robots in Human Environments, 2001.

D. M. Berry, Abstract appliances and software: The importance of the buyer's warranty and the developer's liability in promoting the use of systematic quality assurance and formal methods

D. Biswas, T. Gazagnaire, and B. Genest, Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination, 2008 11th IEEE High Assurance Systems Engineering Symposium, 2008.
DOI : 10.1109/HASE.2008.24

L. Brandan-briones, A. Lazovik, and P. Dague, Optimal observability for diagnosability, International Workshop on Principles of Diagnosis, 2008.

N. Craipeau, La preuvé electronique, 2009.

A. D. Farrell, M. J. Sergot, M. Sallé, and C. Bartolini, USING THE EVENT CALCULUS FOR TRACKING THE NORMATIVE STATE OF CONTRACTS, International Journal of Cooperative Information Systems, vol.14, issue.02n03, pp.99-129, 2005.
DOI : 10.1142/S0218843005001110

P. Gladyshev and A. Enbacka, Rigorous development of automated inconsistency checks for digital evidence using the B method, International Journal of Digital Evidence, vol.6, issue.2, pp.1-21, 2007.

G. Governatori, Z. Milosevic, and S. W. Sadiq, Compliance checking between business processes and business contracts, 2006 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC'06), pp.221-232, 2006.
DOI : 10.1109/EDOC.2006.22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.2592

D. Grossi, L. Royakkers, and F. Dignum, Organizational structure and responsibility, Artificial Intelligence and Law, vol.3, issue.3, pp.223-249, 2007.
DOI : 10.1007/s10506-007-9054-0

URL : http://dx.doi.org/10.1007/s10506-007-9054-0

R. Hardouin, Le sens des responsabilitiés enmatì ere de contrats informatiques, 2009.

A. K. Jones and R. S. Sielken, Computer system intrusion detection: a survey, 1999.

F. Kamareddine, M. Maarek, and J. B. Wells, Flexible Encoding of Mathematics on the Computer, Mathematical Knowledge Management, 3rd Int'l Conf., Proceedings, pp.160-174, 2004.
DOI : 10.1007/3-540-36469-2_15

D. and L. Métayer, A Formal Privacy Management Framework, Formal Aspects in Security and Trust (FAST), pp.162-176, 2009.
DOI : 10.1007/978-3-642-01465-9_11

S. Lipovetsky, Les clauses limitatives de responsabilité et de garantie dans les contrats informatiques

B. Littlewood and L. Strigini, Software reliability and dependability, Proceedings of the conference on The future of Software engineering , ICSE '00, pp.175-188, 2000.
DOI : 10.1145/336512.336551

G. J. Pace and G. Schneider, Challenges in the Specification of Full Contracts, Lecture Notes in Computer Science, vol.12, issue.1, pp.292-306, 2009.
DOI : 10.1007/11786849_21

Y. Papadopoulos, Model-based system monitoring and diagnosis of failures using statecharts and fault trees, Reliability Engineering & System Safety, vol.81, issue.3, pp.325-341, 2003.
DOI : 10.1016/S0951-8320(03)00095-4

P. Parrend and S. Frénot, Security benchmarks of OSGi platforms: toward hardened OSGi. Software -Practice and Experience (SPE), pp.471-499, 2009.

S. Peisert, S. Karin, M. Bishop, and K. Marzullo, Principles-driven forensic analysis, Proceedings of the 2005 workshop on New security paradigms , NSPW '05, pp.85-93, 2005.
DOI : 10.1145/1146269.1146291

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.8325

S. L. Peyton-jones and J. Eber, How to write a financial contract, The Fun of Programming, Cornerstones of Computing, 2003.

C. Picardi, R. Bray, F. Cascio, L. Console, P. Dague et al., Idd: Integrating diagnosis in the design of automotive systems, ECAI, pp.628-632, 2002.

C. Prisacariu and G. Schneider, A Formal Language for Electronic Contracts, Lecture Notes in Computer Science, vol.12, issue.3, pp.174-189, 2007.
DOI : 10.1111/1467-9337.00106

S. Rekhis and N. Boudriga, A Temporal Logic-Based Model for Forensic Investigation in Networked System Security, Computer Network Security, vol.3685, pp.325-338, 2005.
DOI : 10.1007/11560326_25

D. J. Ryan, Two views on security software liability. Let the legal system decide, IEEE Security & Privacy Magazine, vol.99, issue.1, pp.70-72, 2003.
DOI : 10.1109/MSECP.2003.1176999

F. B. Schneider, Accountability for perfection. Security & Privacy, IEEE, vol.7, issue.2, pp.3-4, 2009.
DOI : 10.1109/msp.2009.30

B. Schneier and J. Kelsey, Secure audit logs to support computer forensics, ACM Transactions on Information and System Security, vol.2, issue.2, pp.159-176, 1999.
DOI : 10.1145/317087.317089

M. Solon and P. Harper, Preparing evidence for court, Digital Investigation, vol.1, issue.4, pp.279-283, 2004.
DOI : 10.1016/j.diin.2004.11.005

P. Stephenson, Modeling of post-incident root cause analysis, International Journal of Digital Evidence, vol.2, issue.2, 2003.

R. E. Stirewalt, L. K. Dillon, and E. Kraemer, The inference validity problem in legal discovery, 2009 31st International Conference on Software Engineering, Companion Volume, pp.303-306, 2009.
DOI : 10.1109/ICSE-COMPANION.2009.5071007

S. Yang, L. Hélouët, and T. Gazagnaire, Logic-based diagnosis for distributed systems, Perspectives in Concurrency Theory: A Festschrift for P. S. Thiagarajan, 2009.