C. Cornax and M. , Service choreographies through a graphical notation based on abstraction layers and viewpoints, 2011 FIFTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2011.
DOI : 10.1109/RCIS.2011.6006837

URL : https://hal.archives-ouvertes.fr/hal-00953444

S. Chollet and P. Lalanda, Security Specification at Process Level, 2008 IEEE International Conference on Services Computing, 2008.
DOI : 10.1109/SCC.2008.51

URL : https://hal.archives-ouvertes.fr/hal-00941715

S. Dami, J. Estublier, and M. Amiour, APEL: A Graphical Yet Executable Formalism for Process Modeling, Softw. Eng, vol.5, pp.61-96, 1998.
DOI : 10.1007/978-1-4615-5441-7_4

A. Faravelon, S. Chollet, C. Verdier, and A. Front, Configuring Private Data Management as Access Restrictions: From Design to Enforcement, International Conference on Service Oriented Computing, 2012.
DOI : 10.1007/978-3-642-34321-6_23

URL : https://hal.archives-ouvertes.fr/hal-00723506

C. Jones, End user programming, Computer, vol.28, issue.9, pp.68-70, 1995.
DOI : 10.1109/2.410158

. Meng-yen, H. Hsieh, K. Lin, and . Li, A web-based travel system using mashup in the RESTful design, International Journal of Computational Science and Engineering, vol.6, pp.3-185, 2011.

M. P. Papazoglou, Service-oriented computing: concepts, characteristics and directions, Proceedings of the 7th International Conference on Properties and Applications of Dielectric Materials (Cat. No.03CH37417), 2003.
DOI : 10.1109/WISE.2003.1254461

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. Pautasso, RESTful Web service composition with BPEL for REST, Data & Knowledge Engineering, vol.68, issue.9, pp.9-851, 2009.
DOI : 10.1016/j.datak.2009.02.016

F. Rosenberg, F. Curbera, M. J. Duftler, and R. Khalaf, Composing RESTful Services and Collaborative Workflows: A Lightweight Approach, IEEE Internet Computing, vol.12, issue.5, pp.524-555, 2008.
DOI : 10.1109/MIC.2008.98

S. Sun and K. Beznosov, The devil is in the (implementation) details, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382238

C. Wolter and A. Schaad, Modeling of task-based authorization constraints in BPMN BPM'07, 2007.