A. Bennaceur, Dynamic Synthesis of Mediators in Ubiquitous Environments, 2013.
URL : https://hal.archives-ouvertes.fr/tel-00849402

A. Bennaceur, C. Chilton, M. Isberner, and B. Jonsson, Automated Mediator Synthesis: Combining Behavioural and Ontological Reasoning, Proc. of SEFM, 2013.
DOI : 10.1007/978-3-642-40561-7_19

URL : https://hal.archives-ouvertes.fr/hal-00838788

A. Bennaceur, V. Issarny, D. Sykes, F. Howar, M. Isberner et al., Machine Learning for Emergent Middleware, Proc. of the Joint workshop on Intel. Methods for Soft. System Eng., JIMSE, 2012.
DOI : 10.1007/978-3-642-45260-4_2

URL : https://hal.archives-ouvertes.fr/hal-00722051

P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, Tropos: An Agent-Oriented Software Development Methodology, Autonomous Agents and Multi-Agent Systems, vol.8, issue.3, 2004.
DOI : 10.1023/B:AGNT.0000018806.20944.ef

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.7049

Y. Bromberg, P. Grace, L. Réveilì, and G. S. Blair, Bridging the Interoperability Gap: Overcoming Combined Application and Middleware Heterogeneity, Proc. of Middleware, 2011.
DOI : 10.1007/978-3-642-25821-3_20

URL : https://hal.archives-ouvertes.fr/hal-00643601

L. Cavallaro, P. Sawyer, D. Sykes, N. Bencomo, and V. Issarny, Satisfying requirements for pervasive service compositions, Proceedings of the 7th Workshop on Models@run.time, MRT '12, 2012.
DOI : 10.1145/2422518.2422522

URL : https://hal.archives-ouvertes.fr/hal-00733346

A. Computing, An architectural blueprint for autonomic computing IBM White Paper Discoa: architectural adaptations for security and qos, ACM SIGSOFT Software Engineering Notes, vol.30, issue.4, 2005.

E. Fernandez-buglioni, Security patterns in practice: designing secure architectures using software patterns, 2013.

C. Ghezzi, L. S. Pinto, P. Spoletini, and G. Tamburrelli, Managing non-functional uncertainty via model-driven adaptivity, 2013 35th International Conference on Software Engineering (ICSE), 2013.
DOI : 10.1109/ICSE.2013.6606549

C. B. Haley, R. C. Laney, J. D. Moffett, and B. Nuseibeh, Security Requirements Engineering: A Framework for Representation and Analysis, IEEE Transactions on Software Engineering, vol.34, issue.1, 2008.
DOI : 10.1109/TSE.2007.70754

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.210.512

P. Inverardi and M. Tivoli, Automatic synthesis of modular connectors via composition of protocol mediation patterns, 2013 35th International Conference on Software Engineering (ICSE), 2013.
DOI : 10.1109/ICSE.2013.6606546

V. Issarny and A. Bennaceur, Composing Distributed Systems: Overcoming the Interoperability Challenge, HATS International School on Formal Models for Components and Objects, 2012.
DOI : 10.1007/978-3-642-40615-7_6

URL : https://hal.archives-ouvertes.fr/hal-00828801

M. Jackson and P. Zave, Deriving specifications from requirements, Proceedings of the 17th international conference on Software engineering , ICSE '95, 1995.
DOI : 10.1145/225014.225016

A. Lazarevic, V. Kumar, and J. Srivastava, Intrusion Detection: A Survey, Managing Cyber Threats, 2005.
DOI : 10.1007/0-387-24230-9_2

D. Lorenzoli, L. Mariani, and M. Pezzè, Automatic generation of software behavioral models, Proceedings of the 13th international conference on Software engineering , ICSE '08, 2008.
DOI : 10.1145/1368088.1368157

D. Lorenzoli and G. Spanoudakis, Detection of Security and Dependability Threats: A Belief Based Reasoning Approach, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009.
DOI : 10.1109/SECURWARE.2009.55

D. Martin, M. Burstein, D. Mcdermott, S. Mcilraith, M. Paolucci et al., Bringing Semantics to Web Services with OWL-S, Proc. of WWW, 2007.
DOI : 10.1007/s11280-007-0033-x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.455.2286

L. Pasquale, C. Menghi, M. Salehie, L. Cavallaro, I. Omoronyia et al., SecuriTAS, Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE '12, 2012.
DOI : 10.1145/2393596.2393618

M. Salehie, L. Pasquale, I. Omoronyia, R. Ali, and B. Nuseibeh, Requirements-driven adaptive security: Protecting variable assets at runtime, 2012 20th IEEE International Requirements Engineering Conference (RE), 2012.
DOI : 10.1109/RE.2012.6345794

URL : http://www.foolabs.com/xpdf/download.html

A. Tanenbaum and M. Van-steen, Distributed systems: principles and paradigms, 2006.

G. Wiederhold, Mediators in the architecture of future information systems, Computer, vol.25, issue.3, 1992.
DOI : 10.1109/2.121508

Z. Yang, Z. Zhou, B. H. Cheng, and P. K. Mckinley, Enabling collaborative adaptation across legacy components, Proceedings of the 3rd workshop on Adaptive and reflective middleware -, 2004.
DOI : 10.1145/1028613.1028629

E. Yuan, N. Esfahani, and S. Malek, A Systematic Survey of Self-Protecting Software Systems, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4
DOI : 10.1145/2555611