F. Bachmann, L. Bass, C. Buhman, S. Comella-dorda, F. Long et al., Technical Concepts of Component-Based Software Engineering, 2000.

M. Barbacci, M. H. Klein, T. A. Longsta, and C. B. Weinstock, Quality attributes, 1995.

A. Beugnard, J. M. Jézéquel, N. Plouzeau, and D. Watkins, Making components contract aware, Computer, vol.32, issue.7, p.3845, 1999.
DOI : 10.1109/2.774917

E. Bruneton, T. Coupaye, M. Leclercq, V. Quéma, and J. B. Stefani, The FRACTAL component model and its support in Java, Software: Practice and Experience, vol.6, issue.11-12, pp.11-12, 2006.
DOI : 10.1002/spe.767

A. Cansado, C. Canal, G. Salaün, and J. Cubo, A formal framework for structural reconguration of components under behavioural adaptation. Procs. of the 6th Intl, ENTCS, vol.263, issue.1, pp.95-110, 2009.

H. Chang and P. Collet, Compositional Patterns of Non-Functional Properties for Contract Negotiation, Journal of Software, vol.2, issue.2, p.5263, 2007.
DOI : 10.4304/jsw.2.2.52-63

H. Chang and P. Collet, Patterns for Integrating and Exploiting Some Non-Functional Properties in Hierarchical Software Components, 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07), p.8392, 2007.
DOI : 10.1109/ECBS.2007.59

D. Conan, R. Rouvoy, and L. Seinturier, Scalable Processing of Context Information with COSMOS, Lecture Notes in Computer Science, vol.1, issue.3, p.210224, 2007.
DOI : 10.1109/MPRV.2002.1037720

URL : https://hal.archives-ouvertes.fr/inria-00155045

H. Ehrig, K. Ehrig, U. Prange, and G. Taentzer, Fundamentals of Algebraic Graph Transformation, 2009.

H. Ehrig, C. Ermel, O. Runge, A. Bucchiarone, and P. Pelliccione, Formal analysis and verication of self-healing systems, FASE'10, p.139153, 2010.

P. Hn¥tynka and F. Plá²il, Dynamic reconguration and access to services in hierarchical component models, Proceedings of CBSE 2006, pp.352359-00525438, 2006.

A. Keller and H. Ludwig, The wsla framework: Specifying and monitoring service level agreements for web services, J. Netw. Syst. Manage, vol.11, issue.1, p.5781, 2003.

S. Krakowiak, Middleware architecture with patterns and frameworks, 2009.

B. Meyer, Applying 'design by contract', Computer, vol.25, issue.10, p.4051, 1992.
DOI : 10.1109/2.161279

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.72.7831

P. Oreizy, M. M. Gorlick, R. N. Taylor, D. Heimbigner, G. Johnson et al., An architecture-based approach to self-adaptive software, IEEE Intelligent Systems, vol.14, issue.3, p.5462, 1999.
DOI : 10.1109/5254.769885

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.183.4716

N. Paspallis, R. Rouvoy, P. Barone, G. A. Papadopoulos, F. Eliassen et al., A pluggable and recongurable architecture for a context-aware enabling middleware system, Lecture Notes in Computer Science, vol.5331, issue.553570, 2008.
DOI : 10.1007/978-3-540-88871-0_40

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.1520

J. Ramachandran, Designing Security Architecture Solutions, 2002.

R. N. Taylor, N. Medvidovic, and P. Oreizy, Architectural styles for runtime software adaptation, 2009 Joint Working IEEE/IFIP Conference on Software Architecture & European Conference on Software Architecture, p.171180, 2009.
DOI : 10.1109/WICSA.2009.5290803

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.4927

V. X. Tran and H. Tsuji, A Survey and Analysis on Semantics in QoS for Web Services, 2009 International Conference on Advanced Information Networking and Applications, p.379385, 2009.
DOI : 10.1109/AINA.2009.43

W. Zeng, X. Zhuang, and J. Lan, Network friendly media security: Rationales, solutions , and open issues, Procs. of the 2004 Intl. Conf. on Image Processing (ICIP), p.565568, 2004.