1. Mobile values, new names, and secure communication;Abadi,2001
2. On bisimulations for the asynchronous pi-calculus;Amadio;Theoretical Computer Science,1998
3. A fuzzy approach for negotiating quality of services;Bacciu,2006
4. An accessible verification environment for UML models of services;Banti;Journal of Symbolic Computation,2011
5. Security issues in service composition;Bartoletti,2006