Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
Scaling up SLA monitoring in pervasive environments, International workshop on Engineering of software services for pervasive environments in conjunction with the 6th ESEC/FSE joint meeting, ESSPE '07, pp.65-68, 2007. ,
DOI : 10.1145/1294904.1294914
Model-based evaluation as a support to the design of dependable systems, Dependable Computing Systems: Paradigms, Performance Issues, and Applications, pp.57-86, 2005. ,
Software monitoring with bounded overhead, 2008 IEEE International Symposium on Parallel and Distributed Processing, pp.1-8, 2008. ,
DOI : 10.1109/IPDPS.2008.4536433
Enhancing Java ME Security Support with Resource Usage Monitoring, ICICS, pp.256-266, 2008. ,
DOI : 10.1145/359576.359585
Deliverable 2.1 ? Capturing functional and non-functional connector behaviours, 2010. ,
Deliverable 5.1 ? Conceptual models for assessment and assurance of dependability, security and privacy in the eternal CONNECTed world, 2010. ,
Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective, SSS, pp.254-268, 2009. ,
DOI : 10.1007/978-3-642-05118-0_18
Security-by-contract (SxC) for software and services of mobile systems, At your service: Service Engineering in the Information Society Technologies Program, 2008. ,
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code, EuroPKI, pp.297-312, 2007. ,
DOI : 10.1007/978-3-540-73408-6_21
A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application, ISoLA, pp.221-236, 2008. ,
DOI : 10.1016/j.entcs.2007.03.025
Resilience engineering: concepts and precepts, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00572766
Trust Type Based Semantic Web Services Assessment and Selection, 2008 10th International Conference on Advanced Communication Technology, pp.2048-2053, 2008. ,
DOI : 10.1109/ICACT.2008.4494190
From dependability to resilience, 38th IEEE/IFIP Int. Conf. On Dependable Systems and Networks, 2008. ,
Reputation Propagation in Composite Services, 2009 IEEE International Conference on Web Services, pp.295-302, 2009. ,
DOI : 10.1109/ICWS.2009.54
Model-based evaluation: from dependability to security, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.48-65, 2004. ,
DOI : 10.1109/TDSC.2004.11
Integrating Behavioral Trust in Web Service Compositions, 2009 IEEE International Conference on Web Services, pp.453-460, 2009. ,
DOI : 10.1109/ICWS.2009.106
A scalable content-addressable network, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.161-172, 2001. ,
T2D, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, p.2010 ,
DOI : 10.1145/1774088.1774403
URL : https://hal.archives-ouvertes.fr/inria-00469649
Model-Carrying Code (MCC), Proceedings of the 2001 workshop on New security paradigms , NSPW '01, pp.23-30, 2001. ,
DOI : 10.1145/508171.508175
Model-carrying code: a practical approach for safe execution of untrusted applications, SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp.15-28, 2003. ,
Chord: A scalable peer-to-peer lookup service for internet applications, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.149-160, 2001. ,