S. Hallé, R. Khoury, A. El-hokayem, and Y. Falcone, Decentralized Enforcement of Artifact Lifecycles, 2016 IEEE 20th International Enterprise Distributed Object Computing Conference (EDOC), 2016.
DOI : 10.1109/EDOC.2016.7579380

N. Bielova, F. Massacci, and A. Micheletti, Towards Practical Enforcement Theories, Proceedings of The 14th Nordic Conference on Secure IT Systems, pp.239-254, 2009.
DOI : 10.1016/j.ic.2007.07.009

N. Bielova and F. Massacci, Predictability of Enforcement, Proceedings of the International Symposium on Engineering Secure Software and Systems 2011, pp.73-86, 2011.
DOI : 10.1016/j.ic.2007.07.009

R. R. Mukkamala, T. T. Hildebrandt, and J. B. Tøth, The resultmaker online consultant: From declarative workflow management in practice to LTL, EDOCW, pp.135-14257, 2008.

P. W. Fong, Access control by tracking shallow execution history, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.43-551301314, 2004.
DOI : 10.1109/SECPRI.2004.1301314

W. Boebert and R. Kain, A practical alternative to hierarchical integrity policies, 1985.

D. F. Brewer and M. J. Nash, The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-21436295, 1989.
DOI : 10.1109/SECPRI.1989.36295

URL : http://www.comp.nus.edu.sg/~cs4236/readings/chwall.pdf

A. E. Sobel and J. , Alves-Foss, A trace-based model of the Chinese wall security policy, Proc. of the 22nd National Information Systems Security Conference, 1999.

K. J. Biba, Integrity considerations for secure computer systems, Tech. rep., MITRE Corporation, 1977.

H. D. Johansen, E. Birrell, R. Van-renesse, F. B. Schneider, M. Stenhaug et al., Enforcing Privacy Policies with Meta-Code, Proceedings of the 6th Asia-Pacific Workshop on Systems, APSys '15, pp.2015-2031
DOI : 10.1109/CSF.2014.28

A. Nigam and N. Caswell, Business artifacts: An approach to operational specification, IBM Syst, J, vol.42, issue.3, pp.428-445, 2003.
DOI : 10.1147/sj.423.0428

K. Bhattacharya, C. E. Gerede, R. Hull, R. Liu, and J. Su, Towards Formal Analysis of Artifact-Centric Business Process Models, BPM, pp.288-304, 2007.
DOI : 10.1007/978-3-540-75183-0_21

URL : http://www-db.research.bell-labs.com/project/e-services-composition/BPM-2007-analysis-of-artifact-workflows.pdf

S. Kumaran, R. Liu, and F. Y. Wu, On the Duality of Information-Centric and Activity-Centric Models of Business Processes, CAiSE, pp.32-47, 2008.
DOI : 10.1007/978-3-540-69534-9_3

R. Hull, E. Damaggio, R. De-masellis, F. Fournier, M. Gupta et al., Business artifacts with guard-stage-milestone lifecycles, Proceedings of the 5th ACM international conference on Distributed event-based system, DEBS '11, pp.51-62, 2011.
DOI : 10.1145/2002259.2002270

R. Vaculín, R. Hull, T. Heath, C. Cochran, A. Nigam et al., Declarative business artifact centric modeling of decision and knowledge intensive business processes, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference, pp.151-160, 2011.
DOI : 10.1109/EDOC.2011.36

A. Meyer, L. Pufahl, D. Fahland, and M. Weske, Modeling and Enacting Complex Data Dependencies in Business Processes, BPM, pp.171-186, 2013.
DOI : 10.1007/978-3-642-40176-3_14

V. Künzle and M. Reichert, PHILharmonicFlows: towards a framework for object-aware process management, Journal of Software Maintenance and Evolution: Research and Practice, vol.23, issue.2, pp.205-244, 2011.
DOI : 10.1007/s00450-009-0057-9

B. B. Hariri, D. Calvanese, G. De-giacomo, R. De-masellis, and P. Felli, Foundations of Relational Artifacts Verification, BPM, pp.379-395, 2011.
DOI : 10.1147/sj.423.0428

S. Pearson and M. C. Mont, Sticky Policies: An Approach for Managing Privacy across Multiple Parties, Computer, vol.44, issue.9, pp.60-68, 2011.
DOI : 10.1109/MC.2011.225

E. Birell and F. B. Schneider, Fine-grained user privacy from avenance tags, p.36285

J. Camenisch, A. Shelat, D. Sommer, S. Fischer-hübner, M. Hansen et al., Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005.
DOI : 10.1145/1102486.1102491

URL : http://www.zurich.ibm.com/~jca/papers/cssf05.pdf

X. Zhao, J. Su, H. Yang, and Z. Qiu, Enforcing Constraints on Life Cycles of Business Artifacts, 2009 Third IEEE International Symposium on Theoretical Aspects of Software Engineering, pp.111-11846, 2009.
DOI : 10.1109/TASE.2009.46

A. A. Ataullah and F. W. Tompa, Business policy modeling and enforcement in databases, PVLDB, vol.4, issue.11, pp.921-931, 2011.

D. Calvanese, G. De-giacomo, R. Hull, and J. Su, Artifact-Centric Workflow Dominance, ICSOC-ServiceWave, pp.130-143, 2009.
DOI : 10.1007/978-3-642-10383-4_9

URL : http://www.cs.ucsb.edu/%7Esu/papers/2009/ICSOC2009.pdf

C. E. Gerede and J. Su, Specification and Verification of Artifact Behaviors in Business Process Models, ICSOC, pp.181-192, 2007.
DOI : 10.1007/978-3-540-74974-5_15

S. Hallé, R. Villemaire, and O. Cherkaoui, Specifying and Validating Data-Aware Temporal Web Service Properties, IEEE Transactions on Software Engineering, vol.35, issue.5, p.29, 2009.
DOI : 10.1109/TSE.2009.29

P. Gonzalez, A. Griesmayer, and A. Lomuscio, Verifying GSM-Based Business Artifacts, 2012 IEEE 19th International Conference on Web Services, pp.25-32, 2012.
DOI : 10.1109/ICWS.2012.31

URL : http://www.doc.ic.ac.uk/~alessio/papers/12/ICWS-PG+.pdf

D. Calvanese, M. Montali, M. Estañol, and E. Teniente, Verifiable UML artifactcentric business process models, Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management , CIKM 2014, pp.1289-1298, 2014.
DOI : 10.1145/2661829.2662050

S. Hallé and R. Villemaire, Runtime Enforcement of Web Service Message Contracts with Data, IEEE Transactions on Services Computing, vol.5, issue.2
DOI : 10.1109/TSC.2011.10

Y. Falcone, L. Mounier, J. Fernandez, and J. Richier, Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011.
DOI : 10.1145/1273442.1250746

URL : https://hal.archives-ouvertes.fr/hal-00576948

Y. Falcone, T. Jéron, H. Marchand, and S. Pinisetty, Runtime enforcement of regular timed properties by suppressing and delaying events, Science of Computer Programming, vol.123, pp.2-41, 2016.
DOI : 10.1016/j.scico.2016.02.008

URL : https://hal.archives-ouvertes.fr/hal-01281727

Y. Falcone, H. Barringer, Y. Falcone, B. Finkbeiner, K. Havelund et al., You Should Better Enforce Than Verify, Runtime Verification -First International Conference, pp.89-105, 2010.
DOI : 10.1007/978-3-642-04766-4_20

URL : https://hal.archives-ouvertes.fr/hal-00523653

K. Ouafi and S. Vaudenay, Pathchecker: an RFID application for tracing products in supply-chains, pp.1-14, 2009.

A. K. Bauer and Y. Falcone, Decentralised LTL Monitoring, FM, pp.85-100, 2012.
DOI : 10.1007/978-3-642-32759-9_10

URL : https://hal.archives-ouvertes.fr/hal-01313730

C. Colombo and Y. Falcone, Organising LTL Monitors over Distributed Systems with a Global Clock, RV, pp.140-155, 2014.
DOI : 10.1007/978-3-319-11164-3_12

URL : https://hal.archives-ouvertes.fr/hal-01120551

A. Bauer and Y. Falcone, Decentralised LTL monitoring, Formal Methods in System Design, vol.48, pp.1-2
DOI : 10.1007/978-3-642-32759-9_10

URL : https://hal.archives-ouvertes.fr/hal-01313730

C. Colombo and Y. Falcone, Organising LTL monitors over distributed systems with a global clock, Formal Methods in System Design, vol.49, issue.12
DOI : 10.1007/978-3-319-11164-3_12

URL : https://hal.archives-ouvertes.fr/hal-01120551

Y. Falcone, T. Cornebize, and J. Fernandez, Efficient and Generalized Decentralized Monitoring of Regular Languages, Lecture Notes in Computer Science, vol.8461, pp.66-83, 2014.
DOI : 10.1007/978-3-662-43613-4_5

URL : https://hal.archives-ouvertes.fr/hal-00972559

S. Hallé, Cooperative runtime monitoring, Enterprise Information Systems, vol.7, issue.4, pp.395-423, 2013.
DOI : 10.1080/17517575.2012.683812

G. Spyra, W. J. Buchanan, and E. Ekonomou, Sticky policy enabled authenticated OOXML, 2016 SAI Computing Conference (SAI)
DOI : 10.1109/SAI.2016.7556117

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system URL https, 2008.

K. Okupski, Bitcoin developer reference (2016) URL https://github.com/minium/Bitcoin-Spec

D. Ferraiolo and D. Kuhn, Role-based access control, pp.554-563, 1992.

E. Christensen, F. Curbera, G. Meredith, and S. Weerawarana, Web service description language, 2001.

T. Wilke, Classifying Discrete Temporal Properties, STACS 99, 16th Annual Symposium on Theoretical Aspects of Computer Science Proceedings, pp.32-46, 1999.
DOI : 10.1007/3-540-49116-3_3

URL : http://www-i7.informatik.rwth-aachen.de/~wilke/publications/STACS99.html.ps.gz

G. Ateniese, M. Steiner, and G. Tsudik, New multiparty authentication services and key agreement protocols, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, 2000.
DOI : 10.1109/49.839937

S. Hallé and R. Khoury, SealTest: a simple library for test sequence generation, in: Bultan and Sen, pp.392-395

S. Hallé, LabPal: repeatable computer experiments made easy, Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis , ISSTA 2017, pp.404-407
DOI : 10.1109/EDOC.2016.7579380