Dynamic Synthesis of Mediators in Ubiquitous Environments, 2013. ,
URL : https://hal.archives-ouvertes.fr/tel-00849402
Automated Mediator Synthesis: Combining Behavioural and Ontological Reasoning, Proc. of SEFM, 2013. ,
DOI : 10.1007/978-3-642-40561-7_19
URL : https://hal.archives-ouvertes.fr/hal-00838788
Machine Learning for Emergent Middleware, Proc. of the Joint workshop on Intel. Methods for Soft. System Eng., JIMSE, 2012. ,
DOI : 10.1007/978-3-642-45260-4_2
URL : https://hal.archives-ouvertes.fr/hal-00722051
Tropos: An Agent-Oriented Software Development Methodology, Autonomous Agents and Multi-Agent Systems, vol.8, issue.3, 2004. ,
DOI : 10.1023/B:AGNT.0000018806.20944.ef
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.7049
Bridging the Interoperability Gap: Overcoming Combined Application and Middleware Heterogeneity, Proc. of Middleware, 2011. ,
DOI : 10.1007/978-3-642-25821-3_20
URL : https://hal.archives-ouvertes.fr/hal-00643601
Satisfying requirements for pervasive service compositions, Proceedings of the 7th Workshop on Models@run.time, MRT '12, 2012. ,
DOI : 10.1145/2422518.2422522
URL : https://hal.archives-ouvertes.fr/hal-00733346
An architectural blueprint for autonomic computing IBM White Paper Discoa: architectural adaptations for security and qos, ACM SIGSOFT Software Engineering Notes, vol.30, issue.4, 2005. ,
Security patterns in practice: designing secure architectures using software patterns, 2013. ,
Managing non-functional uncertainty via model-driven adaptivity, 2013 35th International Conference on Software Engineering (ICSE), 2013. ,
DOI : 10.1109/ICSE.2013.6606549
Security Requirements Engineering: A Framework for Representation and Analysis, IEEE Transactions on Software Engineering, vol.34, issue.1, 2008. ,
DOI : 10.1109/TSE.2007.70754
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.210.512
Automatic synthesis of modular connectors via composition of protocol mediation patterns, 2013 35th International Conference on Software Engineering (ICSE), 2013. ,
DOI : 10.1109/ICSE.2013.6606546
Composing Distributed Systems: Overcoming the Interoperability Challenge, HATS International School on Formal Models for Components and Objects, 2012. ,
DOI : 10.1007/978-3-642-40615-7_6
URL : https://hal.archives-ouvertes.fr/hal-00828801
Deriving specifications from requirements, Proceedings of the 17th international conference on Software engineering , ICSE '95, 1995. ,
DOI : 10.1145/225014.225016
Intrusion Detection: A Survey, Managing Cyber Threats, 2005. ,
DOI : 10.1007/0-387-24230-9_2
Automatic generation of software behavioral models, Proceedings of the 13th international conference on Software engineering , ICSE '08, 2008. ,
DOI : 10.1145/1368088.1368157
Detection of Security and Dependability Threats: A Belief Based Reasoning Approach, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009. ,
DOI : 10.1109/SECURWARE.2009.55
Bringing Semantics to Web Services with OWL-S, Proc. of WWW, 2007. ,
DOI : 10.1007/s11280-007-0033-x
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.455.2286
SecuriTAS, Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE '12, 2012. ,
DOI : 10.1145/2393596.2393618
Requirements-driven adaptive security: Protecting variable assets at runtime, 2012 20th IEEE International Requirements Engineering Conference (RE), 2012. ,
DOI : 10.1109/RE.2012.6345794
URL : http://www.foolabs.com/xpdf/download.html
Distributed systems: principles and paradigms, 2006. ,
Mediators in the architecture of future information systems, Computer, vol.25, issue.3, 1992. ,
DOI : 10.1109/2.121508
Enabling collaborative adaptation across legacy components, Proceedings of the 3rd workshop on Adaptive and reflective middleware -, 2004. ,
DOI : 10.1145/1028613.1028629
A Systematic Survey of Self-Protecting Software Systems, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4 ,
DOI : 10.1145/2555611