W. Budan, L. Rongheng, and C. Junliang, Integrating RESTful Service into BPEL Business Process on Service Generation System, Proceedings of the IEEE Service Computing Conference, pp.527-534, 2013.

S. Chollet and P. Lalanda, Security Specification at Process Level, 2008 IEEE International Conference on Services Computing, pp.165-172, 2008.
DOI : 10.1109/SCC.2008.51

URL : https://hal.archives-ouvertes.fr/hal-00941715

M. and C. Cornax, Service choreographies through a graphical notation based on abstraction layers and viewpoints, 2011 FIFTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, pp.1-11, 2011.
DOI : 10.1109/RCIS.2011.6006837

URL : https://hal.archives-ouvertes.fr/hal-00953444

A. Faravelon, S. Chollet, C. Verdier, and A. Front, Configuring Private Data Management as Access Restrictions: From Design to Enforcement, International Conference on Service Oriented Computing, pp.344-358, 2012.
DOI : 10.1007/978-3-642-34321-6_23

URL : https://hal.archives-ouvertes.fr/hal-00723506

. Microsoft, Data privacy day privacy survey, 2013.

H. Meng-yen, L. Hua-yil, -. Kuan, and . Li, A web-based travel system using mashup in the RESTful design, International Journal of Computational Science and Engineering, vol.6, pp.3-185

L. Panziera and F. Paoli, A framework for self-descriptive RESTful services, Proceedings of the 22nd International Conference on World Wide Web, WWW '13 Companion, pp.1407-1414, 2013.
DOI : 10.1145/2487788.2488183

M. Papazoglou, Service-oriented computing: concepts, characteristics and directions, Proceedings of the 7th International Conference on Properties and Applications of Dielectric Materials (Cat. No.03CH37417), pp.3-12, 2003.
DOI : 10.1109/WISE.2003.1254461

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.323.9432

P. Pautasso, RESTful Web service composition with BPEL for REST, Data & Knowledge Engineering, vol.68, issue.9, pp.851-866
DOI : 10.1016/j.datak.2009.02.016

R. Fielding and R. Taylor, Principled design of the modern Web architecture, ACM Transactions on Internet Technology, vol.2, issue.2, pp.115-150
DOI : 10.1145/514183.514185

F. Rosenberg, F. Curbera, M. J. Duftler, R. Khalaf, and R. , Composing RESTful Services and Collaborative Workflows: A Lightweight Approach, IEEE Internet Computing, vol.12, issue.5, pp.524-555
DOI : 10.1109/MIC.2008.98

S. Sun and K. Beznosov, The devil is in the (implementation) details, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.378-390, 2012.
DOI : 10.1145/2382196.2382238

T. Stoitsev, S. Scheidl, F. Flentge, and M. Mühlhäuser, Enabling End Users to Proactively Tailor Underspecified, Human-Centric Business ProcessesProgramming by Example" of Weakly-Structured Process Models, pp.307-320, 2008.

C. Wolter and A. Schaad, Modeling of task-based authorization constraints in BPM'07, pp.64-69, 2007.