1. Automated Validation of Trust and Security of Service-Oriented Architectures, AVANTSSAR project,
http://www.avantssar.eu
2. Network of Excellence on Engineering Secure Future Internet Software Services and Systems, NESSoS project,
http://www.nessos-project.eu
3. Avanesov, T., Chevalier, Y., Rusinowitch, M., Turuani, M.: Satisfiability of General Intruder Constraints with and without a Set Constructor. Research Report RR-7276, INRIA (May 2010),
http://hal.inria.fr/inria-00480632/en/
4. Baresi, L., Maurino, A., Modafferi, S.: Towards distributed bpel orchestrations. ECEASST 3 (2006)
5. Berardi, D., Calvanese, D., De Giacomo, G., Hull, R., Mecella, M.: Automatic Composition of Transition-based semantic Web Services with Messaging. In: Proc. 31st Int. Conf. Very Large Data Bases, VLDB 2005, pp. 613–624 (2005)