101 4.3.2 Data protection 102 4.3.3 Vertex private key distribution mechanism, p.111 ,
114 4.5.1 Inherent security properties, p.117 ,
Engineering diploma in Telecommunications joint programme with Institut Eurecom. Relevant courses: Network processing, Institut National des Telecommunications, 2001. ,
Enabling pervasive execution of workflows Augmenting Web services composition with transactional requirements This paper received the conference runnersup award Towards transactional pervasive workflows, 1st IEEE International Conference on Collaborative Computing:Networking , Applications and Worksharing the proceedings of ICWS 2006, IEEE International Conference on Web Services Montagut and R. Molva, in the proceedings of EDOC 2006, pp.16-20, 2005. ,
Traceability and Integrity of Execution in Distributed Workflow Management Systems Journal Papers The Pervasive Workflow: A Decentralized Workflow System Supporting Long Running Transactions Automating the composition of transactional Web services Utilisation des informations contextuelles pour assurer la sécurité d'un processus collaboratif distribué : un exemple dans l'e-Santé Automating the composition of transactional Web services, IEEE International Conference on Services Computing the proceedings of ESORICS 2007, 12th European Symposium On Research In Computer Security To appear in International Journal on Web Services Research, Idea Publishing. Book chapters Montagut, R. Molva and S. Golega, in " Managing Web Services Quality: Measuring Outcomes and Effectiveness2PC] Open system interconnection-distributed transaction processing (osi-tp) model. iso is 100261, pp.9-13, 2007. ,
Exotica/FMQM: A Persistent Message-Based Architecture for Distributed Workflow Management, Proceedings of the IFIP WG8.1 Working Conference on Information Systems Development for Decentralized Organizations, 1995. ,
DOI : 10.1007/978-0-387-34871-1_1
Advanced transaction models in workflow contexts, Proceedings of the Twelfth International Conference on Data Engineering, 1996. ,
DOI : 10.1109/ICDE.1996.492208
Functionality and limitations of current workflow management systems, 1997. ,
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, Lecture Notes in Computer Science, vol.1880, pp.255-271, 2000. ,
DOI : 10.1007/3-540-44598-6_16
Web services: Concepts, Architectures , and Applications, 2003. ,
DOI : 10.1007/978-3-662-10876-5
A Chinese wall security model for decentralized workflow systems, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.48-57, 2001. ,
DOI : 10.1145/501983.501991
A service creation environment based on end to end composition of Web services, Proceedings of the 14th international conference on World Wide Web , WWW '05, 2005. ,
DOI : 10.1145/1060745.1060768
Service Orientation: Winning Strategies and Best Practices, 2006. ,
DOI : 10.1017/CBO9780511541186
An authorization model for workflows, Proceedings of the Fourth European Symposium on Research in Computer Security, pp.44-64, 1996. ,
Workflow management systems: The next generation of distributed procesing tools. Advanced Transaction Models and Architectures, pp.35-62, 1997. ,
Injecting RBAC to secure a Web-based workflow system, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.1-10, 2000. ,
DOI : 10.1145/344287.344295
Web services dynamic discovery (ws-discovery), 2005. ,
Exception handling in workflow-driven Web applications, Proceedings of the 14th international conference on World Wide Web , WWW '05, pp.170-179, 2005. ,
DOI : 10.1145/1060745.1060773
Access Control and Authorization Constraints for WS-BPEL, 2006 IEEE International Conference on Web Services (ICWS'06), pp.275-284, 2006. ,
DOI : 10.1109/ICWS.2006.21
Facilitating the rapid development and scalable orchestration of composite web services. Distributed and Parallel Databases, pp.5-37, 2005. ,
Identity-based encryption from the weil pairing, Advances in Cryptology -CRYPTO 2001, 21st Annual International Cryptology Conference, pp.213-229, 2001. ,
The specification and enforcement of authorization constraints in workflow management systems, ACM Transactions on Information and System Security, vol.2, issue.1, pp.65-104, 1999. ,
DOI : 10.1145/300830.300837
Reliable Web Services Composition using a Transactional Approach, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2005. ,
DOI : 10.1109/EEE.2005.113
URL : https://hal.archives-ouvertes.fr/inria-00000503
The NEMO P2P service orchestration framework, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004. ,
DOI : 10.1109/HICSS.2004.1265686
Policy-Based Cryptography and Applications, FC' 2005, 9th International Conference on Financial Cryptography and Data Security, 2005. ,
DOI : 10.1007/11507840_7
URL : https://hal.archives-ouvertes.fr/pastel-00002525
Web services on mobile devices-implementation and experience, Proceedings DARPA Information Survivability Conference and Exposition MCSA-03, 2003. ,
DOI : 10.1109/MCSA.2003.1240771
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.5930
INCAs, Journal of Database Management, vol.7, issue.1, 1994. ,
DOI : 10.4018/jdm.1996010101
INCAs, IEEE Symposium on Security and Privacy, pp.206-214, 1989. ,
DOI : 10.4018/jdm.1996010101
Ensuring required failure atomicity of composite Web services, Proceedings of the 14th international conference on World Wide Web , WWW '05, 2005. ,
DOI : 10.1145/1060745.1060769
URL : https://hal.archives-ouvertes.fr/inria-00000769
Service Orient or Be Doomed!: How Service Orientation Will Change Your Business, 2006. ,
DOI : 10.1002/9781119201755
Policy-based web service composition, Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications, pp.85-92, 2004. ,
Handling Faults in Decentralized Orchestration of Composite Web Services, In Lecture Notes in Computer Science, vol.3826, 2005. ,
DOI : 10.1007/11596141_31
Web services description language (wsdl) 1.1, http, 2001. ,
The next step in web services, Commun. ACM, issue.10, p.46, 2003. ,
Pervasive enablement of business processes, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the, pp.87-97, 2004. ,
DOI : 10.1109/PERCOM.2004.1276848
Preventing information leakage within workflows that execute among competing organizations, Journal of Systems and Software, vol.75, issue.1-2, pp.109-123, 2005. ,
DOI : 10.1016/j.jss.2004.01.003
Providing transactional properties for migrating workflows, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, pp.473-480, 2004. ,
DOI : 10.1109/DEXA.1999.795150
Challenges: Wireless web services, ICPADS '04: Proceedings of the Parallel and Distributed Systems Tenth International Conference on, p.657, 2004. ,
Invisible Future: The Seamless Integration of Technology Into Everyday Life, 2001. ,
Parameterized semantic matching for workflow composition, 2004. ,
Database Transaction Models for Advanced Applications, 1992. ,
Management of heterogeneous and autonomous database systems, 1999. ,
Handling Transactional Properties in Web Service Composition, Web Information Systems Engineering -WISE 2005, 6th International Conference on Web Information Systems Engineering, pp.273-289, 2005. ,
DOI : 10.1007/11581062_21
URL : https://hal.archives-ouvertes.fr/hal-00953911
Achieving Survivability in Business Process Execution Language for Web Services (BPEL) with Exception-Flows, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, pp.68-74, 2005. ,
DOI : 10.1109/EEE.2005.26
Design and implementation of a distributed workflow enactment service, COOPIS '97: Proceedings of the Second IFCIS International Conference on Cooperative Information Systems, pp.89-98, 1997. ,
Utml: Unified transaction modeling language, WISE '02: Proceedings of the 3rd International Conference on Web Information Systems Engineering, pp.115-126, 2002. ,
Compensation is not enough, Proc. of the 7th International Enterprise Distributed Object Computing Conference, 2003. ,
Design Patterns: Elements of Reusable Object-Oriented Software, 2007. ,
Modeling long-running activities as nested sagas, Data Eng, vol.14, issue.1, pp.14-18, 1991. ,
Transaction Processing: Concepts and Techniques, 1993. ,
A secure workflow model, ACSW Frontiers '03: Proceedings of the Australasian information security workshop conference on ACSW frontiers, pp.33-41, 2003. ,
A Hierarchical Model for Transactional Web Service Composition in P2P Networks, ICWS 2007, IEEE International Conference on Web Services, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00948738
The workflow reference model, 1995. ,
From conflict of interest to separation of duties in ws-policy for web services matchmaking process, HICSS '04: Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences, pp.30066-30068, 2004. ,
ANODR, Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '03, pp.291-302, 2003. ,
DOI : 10.1145/778415.778449
Managing Web Services Quality: Measuring Outcomes and Effectiveness, 2008. ,
An access control framework for business processes for web services, Proceedings of the 2003 ACM workshop on XML security , XMLSEC '03, pp.15-24, 2003. ,
DOI : 10.1145/968559.968562
Access control mechanisms for inter-organizational workflow, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.66-74, 2001. ,
DOI : 10.1145/373256.373266
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.3262
Security Requirements of E-Business Processes, Proceedings of the IFIP Conference on Towards The E-Society: E-Commerce, E- Business, E-Government, pp.73-86, 2001. ,
DOI : 10.1007/0-306-47009-8_6
Anonymous Communications for Mobile Agents, MATA '02: Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications, pp.171-181, 2002. ,
DOI : 10.1007/3-540-36086-7_16
Fault Tolerance: Principles and Practice, 1990. ,
Agent-based web services evolution for pervasive computing, APSEC '04: Proceedings of the 11th Asia- Pacific Software Engineering Conference, pp.726-731, 2004. ,
Composing Workflows of Semantic Web Services, Workshop on Web Services and Agent-based Engineering, 2003. ,
DOI : 10.1007/0-387-23344-X_10
Transactions and web services Trustworthy service selection and composition -reducing the entropy of service-oriented web, 3rd IEEE International Conference on Industrial Informatics , 2005. INDIN '05, pp.49-54, 2003. ,
Secure data collection with updates, Electronic Commerce Research, vol.1, pp.1-2, 2001. ,
Security in the web services framework, ISICT '03: Proceedings of the 1st international symposium on Information and communication technologies, pp.481-486, 2003. ,
A lightweight mobile platform for business services networks, BSN '05: Proceedings of the IEEE EEE05 international workshop on Business services networks, pp.12-12, 2005. ,
Web service composition transaction management, ADC '04: Proceedings of the 15th Australasian database conference, pp.171-179, 2004. ,
Business-to-business interactions: issues and enabling technologies, The VLDB Journal, vol.12, issue.1, pp.59-85, 2003. ,
Adapting BPEL4WS for the Semantic Web: The Bottom-Up Approach to Web Service Interoperation, Proceedings of International Semantic Web Conference, 2003. ,
DOI : 10.1007/978-3-540-39718-2_15
Current solutions for Web service composition, IEEE Internet Computing, vol.8, issue.6, pp.51-59, 2004. ,
DOI : 10.1109/MIC.2004.58
Enabling Pervasive Execution of Workflows, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2005. ,
DOI : 10.1109/COLCOM.2005.1651227
Augmenting Web services composition with transactional requirements, ICWS 2006, IEEE International Conference on Web Services, 2006. ,
Towards transactional pervasive workflowsThe Enterprise Computing Conference, pp.16-20, 2006. ,
Enforcing integrity of execution in distributed workflow management systems, International Conference on Services Computing, 2007. ,
Traceability and integrity of execution in distributed workflow management systems, ESORICS 2007, European Symposium On Research In Computer Security, 2007. ,
Automating the composition of transactional web services, To appear in International Journal of Web Services Research, 2008. ,
The pervasive workflow: A decentralized workflow system supporting long running transactions, IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews. Special Issue on Enterprise Service Computing and Industrial Applications, 2008. ,
A transaction model for multidatabase systems, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems, 1992. ,
DOI : 10.1109/ICDCS.1992.235055
Transactional attitudes: Reliable composition of autonomous web services, Workshop on Dependable Middlewarebased Systems, 2002. ,
From centralized workflow specification to distributed workflow execution, Journal of Intelligent Information Systems, vol.10, issue.2, pp.159-184, 1998. ,
Decentralizing composite web services, Proceedings of Workshop on Compilers for Parallel Computing, 2003. ,
DOI : 10.1145/1035292.1028991
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6392
Synchronization analysis for decentralizing composite web services, SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, pp.407-414, 2003. ,
DOI : 10.1145/952603.952612
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.4484
An identity based encryption system, PPPJ '04: Proceedings of the 3rd international symposium on Principles and practice of programming in JavaOWL03] OWL-S specifications, pp.154-159, 2003. ,
Web services and business transactions, World Wide Web, vol.6, issue.1, pp.49-91, 2003. ,
Id-based signatures from pairings on elliptic curves, Electronics Letters, vol.38, issue.18, pp.1025-1026, 2002. ,
Role-based access control for collaborative enterprise in peer-to-peer computing environments, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.93-99, 2003. ,
DOI : 10.1145/775412.775424
Utilisation des informations contextuelles pour assurer la sécurité d'un processus collaboratif distribué : un exemple dans l'e-Santé, OFTA, pp.345-370, 2007. ,
Using workflows to coordinate Web services in pervasive computing environments, Proceedings. IEEE International Conference on Web Services, 2004., pp.288-295, 2004. ,
DOI : 10.1109/ICWS.2004.1314750
Specification and execution of transactional workflows, Modern database systems: the object model, interoperability, and beyond, 1995. ,
A Survey of Automated Web Service Composition Methods, First International Workshop on Semantic Web Services and Web Process Composition, pp.43-54, 2004. ,
DOI : 10.1007/978-3-540-30581-1_5
Atomicity and isolation for transactional processes, ACM Transactions on Database Systems, vol.27, issue.1, pp.63-116, 2002. ,
DOI : 10.1145/507234.507236
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.199
Concurrency control and recovery in transactional process management, Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '99, 1999. ,
DOI : 10.1145/303976.304007
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867
Anonymous connections and onion routing, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.44-54, 1997. ,
DOI : 10.1109/SECPRI.1997.601314
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.3883
Disconnected processes, mechanisms and architecture for mobile e-business, Mob. Netw. Appl, vol.9, issue.6, pp.651-662, 2004. ,
Transaction compensation in web services, The Norwegian Computer Science Conference, 2002. ,
Dynamic service discovery and management in task computing, Mobiquitous, vol.00, pp.310-318, 2004. ,
Architectural issues for cross-organisational B2B interactions, Proceedings 21st International Conference on Distributed Computing Systems Workshops, pp.79-87, 2001. ,
DOI : 10.1109/CDCS.2001.918690
Peer???to???Peer Process Execution with Osiris, First International Conference on Service-Oriented Computing ICSOC, 2003. ,
DOI : 10.1007/978-3-540-24593-3_33
Separation of duty in role-based environments, Proceedings 10th Computer Security Foundations Workshop, pp.183-194, 1997. ,
DOI : 10.1109/CSFW.1997.596811
Specification of secure distributed collaboration systems, The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003., p.149, 2003. ,
DOI : 10.1109/ISADS.2003.1193943
Specifying Web Service Recovery Support with Conversations, Proceedings of the 38th Annual Hawaii International Conference on System Sciences, pp.167-169, 2005. ,
DOI : 10.1109/HICSS.2005.552
URL : https://hal.archives-ouvertes.fr/inria-00414944
Coordinated forward error recovery for composite web services, 22nd Symposium on Reliable Distributed Systems (SRDS), 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00414799
Composition of Coordinated Web Services, Middleware '04: Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware, pp.294-310, 2004. ,
DOI : 10.1145/944217.944234
Distributed policy specification and enforcement in service-oriented business systems, IEEE International Conference on e-Business Engineering (ICEBE'05), pp.10-17, 2005. ,
DOI : 10.1109/ICEBE.2005.52
The owl-s matcher software, 2003. ,
Enabling Secure Discovery in a Pervasive Environment, SPC 2006, 3rd International Conference on Security in Pervasive Computing, 2006. ,
DOI : 10.1007/11734666_3
Multiagent systems with workflows, Internet Computing, vol.8, issue.81, pp.76-82, 2004. ,
Using software agents to support evolution of distributed workflow models, Proc. International ICSC Symposium on Interactive and Collaborative Computing, 2000. ,
The computer for the 21st century, Scientific American, pp.94-110, 1991. ,
Consolidating the Access Control of Composite Applications and Workflows, DBSec, pp.44-59, 2006. ,
DOI : 10.1007/978-3-540-27834-4_61
Concepts and applications of multilevel transactions and open nested transactions, Database Transaction Models for Advanced Applications, pp.515-553, 1992. ,
A role based access control for web services, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004, pp.49-56, 2004. ,
DOI : 10.1109/SCC.2004.1357989
Composition and evaluation of trustworthy web services, BSN '05: Proceedings of the IEEE EEE05 international workshop on Business services networks, pp.5-5, 2005. ,
DOI : 10.1504/IJWGS.2006.008877