Martín Abadi & Cédric Fournet (2003):
Access Control Based on Execution History.
In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, San Diego, California, USA.
The Internet Society.
Massimo Bartoletti (2009):
Usage Automata.
In: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security,
LNCS 5511.
Springer,
pp. 52–69,
doi:10.1007/978-3-642-03459-6_4.
Massimo Bartoletti, Gabriele Costa & Roberto Zunino (2009):
Jalapa: Securing Java with Local Policies.
Electronic Notes in Theoretical Computer Science 253(5),
pp. 145–151,
doi:10.1016/j.entcs.2009.11.020.
Massimo Bartoletti, Pierpaolo Degano & Gian Luigi Ferrari (2009):
Planning and verifying service composition.
Journal of Computer Security (JCS) 17(5),
pp. 799–837,
doi:10.3233/JCS-2009-0357.
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari & Roberto Zunino (2007):
Types and Effects for Resource Usage Analysis.
In: Proc. of FOSSACS-07,
pp. 32–47,
doi:10.1007/978-3-540-71389-0_4.
Stefano Bistarelli, Ugo Montanari & Francesca Rossi (1997):
Semiring-based constraint satisfaction and optimization.
Journal of the ACM 44,
pp. 201–236,
doi:10.1145/256303.256306.
Mario Bravetti, Ivan Lanese & Gianluigi Zavattaro (2008):
Contract-Driven Implementation of Choreographies.
In: Proc. of TGC-08,
pp. 1–18,
doi:10.1007/978-3-642-00945-7_1.
Mario Bravetti & Gianluigi Zavattaro (2007):
Towards a unifying theory for choreography conformance and contract compliance.
In: In Pre-proc. CS-07.
Springer,
pp. 34–50,
doi:10.1007/978-3-540-77351-1_4.
Giuseppe Castagna, Nils Gesbert & Luca Padovani (2008):
A theory of contracts for web services.
SIGPLAN Notices 43,
pp. 261–272,
doi:10.1145/1328438.1328471.
Feng Cheng, David Gamarnik, Nitin Jengte, Wanli Min & Bala Ramachandran (2005):
Modelling Operational Risks in Business Process.
Technical Report RC23872.
IBM.
E. M. Clarke, E. A. Emerson & A. P. Sistla (1986):
Automatic verification of finite-state concurrent systems using temporal logic specifications.
TOPLAS 8,
pp. 244–263,
doi:10.1145/5397.5399.
Gabriele Costa, Pierpaolo Degano & Fabio Martinelli (2010):
Modular Plans for Secure Service Composition.
In: Proc. of ARSPA-WITS-10,
LCNS 6186,
doi:10.1007/978-3-642-16074-5_4.
Gabriele Costa, Pierpaolo Degano & Fabio Martinelli (2011):
Secure service orchestration in open networks.
Journal of Systems Architecture - Embedded Systems Design 57(3),
pp. 231–239,
doi:10.1016/j.sysarc.2010.09.001.
Frank Innerhofer-Oberperfler, Fabio Massacci & Artsiom Yautsiukhin (2008):
Pareto-Optimal Architecture according to Assurance Indicators.
In: Proceedings of the 13th Nordic Workshop on Secure IT Systems.
Cynthia Irvine & Timothy Levin (2000):
Quality of security service.
In: Proceedings of the 2000 Workshop on New security paradigms.
ACM,
New York, NY, USA,
pp. 91–99,
doi:10.1145/366173.366195.
Günter Karjoth, Birgit Pfitzmann, Matthias Schunter & Michael Waidner (2005):
Service-oriented Assurance - Comprehensive Security by Explicit Assurances.
In: Proc. of QoP-05,
doi:10.1007/978-0-387-36584-8_2.
Fabio Martinelli & Ilaria Matteucci (2007):
Synthesis of Web Services Orchestrators in a Timed Setting.
In: Proc. of WS-FM-07,
pp. 124–138,
doi:10.1007/978-3-540-79230-7_9.
Fabio Massacci & Artsiom Yautsiukhin (2007):
An Algorithm for the Appraisal of Assurance Indicators for Complex Business Processe.
In: Proc. of QoP-07.
ACM,
doi:10.1145/1314257.1314265.
G. Rojec-Goldmann M.C. Jaeger & G. Mühl. (2005):
QoS Aggregation in Web Service Compositions.
In: Proc. of EEE-05,
doi:10.1109/EEE.2005.110.
Hanne Riis Nielson & Fleming Nielson (2007):
A flow-sensitive analysis of privacy properties.
In: Proceedings of the 20-th IEEE Computer Security Foundations Symposium,
pp. 249 –264,
doi:10.1109/CSF.2007.4.
Luca Padovani (2008):
Contract-Directed Synthesis of Simple Orchestrators.
In: Proceedings of the 19th international conference on Concurrency Theory.
Springer-Verlag,
pp. 131–146,
doi:10.1007/978-3-540-85361-9_13.
S. Rossi & D. Macedonio (2009):
Information flow security for service compositions.
In: Proc. of ICUMT-09,
pp. 1 –8,
doi:10.1109/ICUMT.2009.5345455.
Tao Yu & Kwei-Jay Lin (2005):
A Broker-Based Framework for QoS-Aware Web Service Composition.
In: Proc. of EEE-05),
doi:10.1109/EEE.2005.1.
Tao Yu, Yue Zhang & Kwei-Jay Lin (2007):
Efficient algorithms for Web services selection with end-to-end QoS constraints.
ACM Transactions on the Web 1,
doi:10.1145/1232722.1232728.