M. Abadi and C. Fournet, Access control based on execution history, NDSS, 2003.

M. Bartoletti, G. Costa, P. Degano, F. Martinelli, and R. Zunino, Securing Java with Local Policies., Workshop on Formal Techniques for Java-like Programs, 2008.
DOI : 10.5381/jot.2009.8.4.a1

M. Bartoletti, P. Degano, and G. L. Ferrari, History-Based Access Control with Local Policies, FoSSaCS, pp.316-332, 2005.
DOI : 10.1007/978-3-540-31982-5_20

M. Bartoletti, P. Degano, and G. L. Ferrari, Planning and verifying service composition, Abridged version In Proc. 18th Computer Security Foundations Workshop (CSFW), pp.799-837, 2005.
DOI : 10.3233/JCS-2009-0357

M. Bartoletti, P. Degano, G. L. Ferrari, and R. Zunino, Secure Service Orchestration, FOSAD, pp.24-74, 2007.
DOI : 10.1007/978-3-540-74810-6_2

J. A. Bergstra and J. W. Klop, Algebra of communicating processes with abstraction, Theoretical Computer Science, vol.37, pp.77-121, 1985.
DOI : 10.1016/0304-3975(85)90088-X

F. Besson, T. P. Jensen, and D. L. Métayer, Model checking security properties of control flow graphs, Journal of Computer Security, vol.9, issue.3, pp.217-250, 2001.
DOI : 10.3233/JCS-2001-9303

M. Boreale and R. D. Nicola, A Symbolic Semantics for the??-Calculus, Information and Computation, vol.126, issue.1, pp.34-52, 1996.
DOI : 10.1006/inco.1996.0032

M. Bravetti, I. Lanese, and G. Zavattaro, Contract-Driven Implementation of Choreographies, TGC, pp.1-18, 2008.
DOI : 10.1016/j.ic.2006.06.002

N. Busi, R. Gorrieri, C. Guidi, R. Lucchi, and G. Zavattaro, Choreography and Orchestration: A Synergic Approach for System Design, ICSOC, pp.228-240, 2005.
DOI : 10.1007/11596141_18

G. Castagna, N. Gesbert, and L. Padovani, A theory of contracts for web services, ACM Trans. Program. Lang. Syst, issue.5, p.31, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00152547

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005.
DOI : 10.1007/s10207-004-0046-8

F. Martinelli and I. Matteucci, Synthesis of Web Services Orchestrators in a Timed Setting, WS-FM, pp.124-138, 2007.
DOI : 10.1007/978-3-540-79230-7_9

R. De, N. , and M. Hennessy, Ccs without tau's, In TAPSOFT, vol.1, pp.138-152, 1987.

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

C. Skalka and S. F. Smith, History Effects and Verification, APLAS, pp.107-128, 2004.
DOI : 10.1007/978-3-540-30477-7_8

G. Costa-'s-web-page, Secure service composition with symbolic effects, 2009.

G. Winskel, The formal semantics of programming languages, 1993.