A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

A. Bertolino, G. D. Angelis, A. Sabetta, and S. G. Elbaum, Scaling up SLA monitoring in pervasive environments, International workshop on Engineering of software services for pervasive environments in conjunction with the 6th ESEC/FSE joint meeting, ESSPE '07, pp.65-68, 2007.
DOI : 10.1145/1294904.1294914

A. Bondavalli, S. Chiaradonna, and F. D. Giandomenico, Model-based evaluation as a support to the design of dependable systems, Dependable Computing Systems: Paradigms, Performance Issues, and Applications, pp.57-86, 2005.

S. Callanan, D. Dean, M. Gorbovitski, R. Grosu, J. Seyster et al., Software monitoring with bounded overhead, 2008 IEEE International Symposium on Parallel and Distributed Processing, pp.1-8, 2008.
DOI : 10.1109/IPDPS.2008.4536433

A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, Enhancing Java ME Security Support with Resource Usage Monitoring, ICICS, pp.256-266, 2008.
DOI : 10.1145/359576.359585

C. Consortium, Deliverable 2.1 ? Capturing functional and non-functional connector behaviours, 2010.

C. Consortium, Deliverable 5.1 ? Conceptual models for assessment and assurance of dependability, security and privacy in the eternal CONNECTed world, 2010.

G. Serugendo, Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective, SSS, pp.254-268, 2009.
DOI : 10.1007/978-3-642-05118-0_18

N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer et al., Security-by-contract (SxC) for software and services of mobile systems, At your service: Service Engineering in the Information Society Technologies Program, 2008.

N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan, Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code, EuroPKI, pp.297-312, 2007.
DOI : 10.1007/978-3-540-73408-6_21

P. Greci, F. Martinelli, and I. Matteucci, A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application, ISoLA, pp.221-236, 2008.
DOI : 10.1016/j.entcs.2007.03.025

E. Hollnagel, D. D. Woods, and N. Leveson, Resilience engineering: concepts and precepts, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00572766

Y. Kim and K. Doh, Trust Type Based Semantic Web Services Assessment and Selection, 2008 10th International Conference on Advanced Communication Technology, pp.2048-2053, 2008.
DOI : 10.1109/ICACT.2008.4494190

J. Laprie, From dependability to resilience, 38th IEEE/IFIP Int. Conf. On Dependable Systems and Networks, 2008.

S. Nepal, Z. Malik, and A. Bouguettaya, Reputation Propagation in Composite Services, 2009 IEEE International Conference on Web Services, pp.295-302, 2009.
DOI : 10.1109/ICWS.2009.54

D. M. Nicol, W. H. Sanders, and K. S. Trivedi, Model-based evaluation: from dependability to security, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.48-65, 2004.
DOI : 10.1109/TDSC.2004.11

S. Paradesi, P. Doshi, and S. Swaika, Integrating Behavioral Trust in Web Service Compositions, 2009 IEEE International Conference on Web Services, pp.453-460, 2009.
DOI : 10.1109/ICWS.2009.106

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker, A scalable content-addressable network, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.161-172, 2001.

R. Saadi, J. M. Pierson, and L. Brunie, T2D, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, p.2010
DOI : 10.1145/1774088.1774403

URL : https://hal.archives-ouvertes.fr/inria-00469649

R. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, and S. A. Smolka, Model-Carrying Code (MCC), Proceedings of the 2001 workshop on New security paradigms , NSPW '01, pp.23-30, 2001.
DOI : 10.1145/508171.508175

R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. Duvarney, Model-carrying code: a practical approach for safe execution of untrusted applications, SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp.15-28, 2003.

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.149-160, 2001.