.. The-solution and T. , 101 4.3.2 Data protection 102 4.3.3 Vertex private key distribution mechanism, p.111

.. Security, 114 4.5.1 Inherent security properties, p.117

@. Sept, Engineering diploma in Telecommunications joint programme with Institut Eurecom. Relevant courses: Network processing, Institut National des Telecommunications, 2001.

F. Montagut, R. Molva, F. Montagut, and R. Molva, Enabling pervasive execution of workflows Augmenting Web services composition with transactional requirements This paper received the conference runnersup award Towards transactional pervasive workflows, 1st IEEE International Conference on Collaborative Computing:Networking , Applications and Worksharing the proceedings of ICWS 2006, IEEE International Conference on Web Services Montagut and R. Molva, in the proceedings of EDOC 2006, pp.16-20, 2005.

R. Montagut, F. Molva, R. Montagut, F. Molva, R. Montagut et al., Traceability and Integrity of Execution in Distributed Workflow Management Systems Journal Papers The Pervasive Workflow: A Decentralized Workflow System Supporting Long Running Transactions Automating the composition of transactional Web services Utilisation des informations contextuelles pour assurer la sécurité d'un processus collaboratif distribué : un exemple dans l'e-Santé Automating the composition of transactional Web services, IEEE International Conference on Services Computing the proceedings of ESORICS 2007, 12th European Symposium On Research In Computer Security To appear in International Journal on Web Services Research, Idea Publishing. Book chapters Montagut, R. Molva and S. Golega, in " Managing Web Services Quality: Measuring Outcomes and Effectiveness2PC] Open system interconnection-distributed transaction processing (osi-tp) model. iso is 100261, pp.9-13, 2007.

D. G. Alonso, A. Agrawal, C. Abbadi, R. Mohan, M. Gunthor et al., Exotica/FMQM: A Persistent Message-Based Architecture for Distributed Workflow Management, Proceedings of the IFIP WG8.1 Working Conference on Information Systems Development for Decentralized Organizations, 1995.
DOI : 10.1007/978-0-387-34871-1_1

D. G. Alonso, A. Agrawal, M. Abbadi, R. Kamath, C. Günthör et al., Advanced transaction models in workflow contexts, Proceedings of the Twelfth International Conference on Data Engineering, 1996.
DOI : 10.1109/ICDE.1996.492208

G. Alonso, D. Agrawal, A. Abbadi, and C. Mohan, Functionality and limitations of current workflow management systems, 1997.

J. [. Ateniese, M. Camenisch, G. Joye, and . Tsudik, A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, Lecture Notes in Computer Science, vol.1880, pp.255-271, 2000.
DOI : 10.1007/3-540-44598-6_16

G. Alonso, F. Casati, H. Kuno, and V. Machiraju, Web services: Concepts, Architectures , and Applications, 2003.
DOI : 10.1007/978-3-662-10876-5

S. [. Atluri, P. Chun, and . Mazzoleni, A Chinese wall security model for decentralized workflow systems, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.48-57, 2001.
DOI : 10.1145/501983.501991

K. Agarwal, N. Dasgupta, A. Karnik, A. Kumar, S. Kundu et al., A service creation environment based on end to end composition of Web services, Proceedings of the 14th international conference on World Wide Web , WWW '05, 2005.
DOI : 10.1145/1060745.1060768

S. [. Allen, P. Higgins, H. Mcrae, and . Schlamann, Service Orientation: Winning Strategies and Best Practices, 2006.
DOI : 10.1017/CBO9780511541186

V. Akh96, W. Atluri, and . Huang, An authorization model for workflows, Proceedings of the Fourth European Symposium on Research in Computer Security, pp.44-64, 1996.

C. [. Alonso and . Mohan, Workflow management systems: The next generation of distributed procesing tools. Advanced Transaction Models and Architectures, pp.35-62, 1997.

[. Ahn, R. Sandhu, M. H. Kang, and J. S. Park, Injecting RBAC to secure a Web-based workflow system, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.1-10, 2000.
DOI : 10.1145/344287.344295

]. J. Ba05 and . Beatty, Web services dynamic discovery (ws-discovery), 2005.

S. [. Brambilla, S. Ceri, C. Comai, and . Tziviskou, Exception handling in workflow-driven Web applications, Proceedings of the 14th international conference on World Wide Web , WWW '05, pp.170-179, 2005.
DOI : 10.1145/1060745.1060773

J. [. Bertino, F. Crampton, and . Paci, Access Control and Authorization Constraints for WS-BPEL, 2006 IEEE International Conference on Web Services (ICWS'06), pp.275-284, 2006.
DOI : 10.1109/ICWS.2006.21

M. [. Benatallah, Q. Z. Dumas, and . Sheng, Facilitating the rapid development and scalable orchestration of composite web services. Distributed and Parallel Databases, pp.5-37, 2005.

M. [. Boneh and . Franklin, Identity-based encryption from the weil pairing, Advances in Cryptology -CRYPTO 2001, 21st Annual International Cryptology Conference, pp.213-229, 2001.

E. [. Bertino, V. Ferrari, and . Atluri, The specification and enforcement of authorization constraints in workflow management systems, ACM Transactions on Information and System Security, vol.2, issue.1, pp.65-104, 1999.
DOI : 10.1145/300830.300837

C. [. Bhiri, O. Godart, and . Perrin, Reliable Web Services Composition using a Transactional Approach, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2005.
DOI : 10.1109/EEE.2005.113

URL : https://hal.archives-ouvertes.fr/inria-00000503

D. [. Bradley and . Maher, The NEMO P2P service orchestration framework, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004.
DOI : 10.1109/HICSS.2004.1265686

R. [. Bagga and . Molva, Policy-Based Cryptography and Applications, FC' 2005, 9th International Conference on Financial Cryptography and Data Security, 2005.
DOI : 10.1007/11507840_7

URL : https://hal.archives-ouvertes.fr/pastel-00002525

S. Berger, S. Mcfaddin, C. Narayanaswami, and M. Raghunath, Web services on mobile devices-implementation and experience, Proceedings DARPA Information Survivability Conference and Exposition MCSA-03, 2003.
DOI : 10.1109/MCSA.2003.1240771

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.5930

[. Barbara, S. Mehrotra, and M. Rusinkiewicz, INCAs, Journal of Database Management, vol.7, issue.1, 1994.
DOI : 10.4018/jdm.1996010101

[. Barbara, S. Mehrotra, M. F. Rusinkiewicz-[-bn89-]-d, M. J. Brewer, and . Nash, INCAs, IEEE Symposium on Security and Privacy, pp.206-214, 1989.
DOI : 10.4018/jdm.1996010101

O. [. Bhiri, C. Perrin, and . Godart, Ensuring required failure atomicity of composite Web services, Proceedings of the 14th international conference on World Wide Web , WWW '05, 2005.
DOI : 10.1145/1060745.1060769

URL : https://hal.archives-ouvertes.fr/inria-00000769

R. [. Bloomberg and . Schmelzer, Service Orient or Be Doomed!: How Service Orientation Will Change Your Business, 2006.
DOI : 10.1002/9781119201755

[. Chun, V. Atluri, and N. R. Adam, Policy-based web service composition, Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications, pp.85-92, 2004.

S. [. Chafle, P. Chandra, V. Kankar, and . Mann, Handling Faults in Decentralized Orchestration of Composite Web Services, In Lecture Notes in Computer Science, vol.3826, 2005.
DOI : 10.1007/11596141_31

E. Christensen, F. Curbera, G. Meredith, and S. Weerawarana, Web services description language (wsdl) 1.1, http, 2001.

. Ckm-+-03-]-f, R. Curbera, N. Khalaf, S. Mukhi, S. Tai et al., The next step in web services, Commun. ACM, issue.10, p.46, 2003.

H. [. Chakraborty and . Lei, Pervasive enablement of business processes, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the, pp.87-97, 2004.
DOI : 10.1109/PERCOM.2004.1276848

A. [. Chou, C. Liu, and . Wu, Preventing information leakage within workflows that execute among competing organizations, Journal of Systems and Software, vol.75, issue.1-2, pp.109-123, 2005.
DOI : 10.1016/j.jss.2004.01.003

M. [. Cichocki and . Rusinkiewicz, Providing transactional properties for migrating workflows, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, pp.473-480, 2004.
DOI : 10.1109/DEXA.1999.795150

C. [. Chu, C. You, and . Teng, Challenges: Wireless web services, ICPADS '04: Proceedings of the Parallel and Distributed Systems Tenth International Conference on, p.657, 2004.

]. P. Den01 and . Denning, Invisible Future: The Seamless Integration of Technology Into Everyday Life, 2001.

R. [. Doshi, R. Goodwin, and . Akkiraju, Parameterized semantic matching for workflow composition, 2004.

]. A. Elm92 and . Elmagarmid, Database Transaction Models for Advanced Applications, 1992.

M. [. Elmagarmid, A. Rusinkiewicz, and . Sheth, Management of heterogeneous and autonomous database systems, 1999.

M. C. Fauvet, H. Duarte, M. Dumas, and B. Benatallah, Handling Transactional Properties in Web Service Composition, Web Information Systems Engineering -WISE 2005, 6th International Conference on Web Information Systems Engineering, pp.273-289, 2005.
DOI : 10.1007/11581062_21

URL : https://hal.archives-ouvertes.fr/hal-00953911

P. [. Fung, D. H. Hung, and . Folger, Achieving Survivability in Business Process Execution Language for Web Services (BPEL) with Exception-Flows, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, pp.68-74, 2005.
DOI : 10.1109/EEE.2005.26

. Gac-+-97-]-e, M. Gokkoca, I. Altinel, N. Cingil, P. Tatbul et al., Design and implementation of a distributed workflow enactment service, COOPIS '97: Proceedings of the Second IFCIS International Conference on Cooperative Information Systems, pp.89-98, 1997.

S. [. Gioldasis and . Christodoulakis, Utml: Unified transaction modeling language, WISE '02: Proceedings of the 3rd International Conference on Web Information Systems Engineering, pp.115-126, 2002.

A. [. Greenfield, J. Fekete, D. Jang, and . Kuo, Compensation is not enough, Proc. of the 7th International Enterprise Distributed Object Computing Conference, 2003.

R. [. Gamma, R. Helm, J. Johnson, and . Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, 2007.

. Gmgk-+-91-]-h, D. Garcia-molina, J. Gawlick, K. Klein, K. Kleissner et al., Modeling long-running activities as nested sagas, Data Eng, vol.14, issue.1, pp.14-18, 1991.

A. [. Gray and . Reuter, Transaction Processing: Concepts and Techniques, 1993.

K. [. Hung and . Karlapalem, A secure workflow model, ACSW Frontiers '03: Proceedings of the Australasian information security workshop conference on ACSW frontiers, pp.33-41, 2003.

M. [. Haddad, M. Manouvrier, and . Rukoz, A Hierarchical Model for Transactional Web Service Composition in P2P Networks, ICWS 2007, IEEE International Conference on Web Services, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00948738

]. D. Hol95 and . Hollingsworth, The workflow reference model, 1995.

]. P. Hun04 and . Hung, From conflict of interest to separation of duties in ws-policy for web services matchmaking process, HICSS '04: Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences, pp.30066-30068, 2004.

X. [. Kong and . Hong, ANODR, Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '03, pp.291-302, 2003.
DOI : 10.1145/778415.778449

]. K. Kha08 and . Khan, Managing Web Services Quality: Measuring Outcomes and Effectiveness, 2008.

F. [. Koshutanski and . Massacci, An access control framework for business processes for web services, Proceedings of the 2003 ACM workshop on XML security , XMLSEC '03, pp.15-24, 2003.
DOI : 10.1145/968559.968562

J. [. Kang, J. N. Park, and . Froscher, Access control mechanisms for inter-organizational workflow, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.66-74, 2001.
DOI : 10.1145/373256.373266

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.3262

S. [. Knorr and . Rohrig, Security Requirements of E-Business Processes, Proceedings of the IFIP Conference on Towards The E-Society: E-Commerce, E- Business, E-Government, pp.73-86, 2001.
DOI : 10.1007/0-306-47009-8_6

R. [. Korba, G. Song, and . Yee, Anonymous Communications for Mobile Agents, MATA '02: Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications, pp.171-181, 2002.
DOI : 10.1007/3-540-36086-7_16

T. [. Lee and . Anderson, Fault Tolerance: Principles and Practice, 1990.

R. Liu, F. Chen, H. Yang, W. C. Chu, and Y. Lai, Agent-based web services evolution for pervasive computing, APSEC '04: Proceedings of the 11th Asia- Pacific Software Engineering Conference, pp.726-731, 2004.

H. [. Laukkanen and . Helin, Composing Workflows of Semantic Web Services, Workshop on Web Services and Agent-based Engineering, 2003.
DOI : 10.1007/0-387-23344-X_10

]. M. Lit03, ]. W. Littleliu05, and . Liu, Transactions and web services Trustworthy service selection and composition -reducing the entropy of service-oriented web, 3rd IEEE International Conference on Industrial Informatics , 2005. INDIN '05, pp.49-54, 2003.

R. [. Loureiro, A. Molva, and . Pannetrat, Secure data collection with updates, Electronic Commerce Research, vol.1, pp.1-2, 2001.

C. [. Li and . Pahl, Security in the web services framework, ISICT '03: Proceedings of the 1st international symposium on Information and communication technologies, pp.481-486, 2003.

[. Liang and R. K. Wong, A lightweight mobile platform for business services networks, BSN '05: Proceedings of the IEEE EEE05 international workshop on Business services networks, pp.12-12, 2005.

Y. [. Limthanmaphon and . Zhang, Web service composition transaction management, ADC '04: Proceedings of the 15th Australasian database conference, pp.171-179, 2004.

. Mbb-+-03-]-b, B. Medjahed, A. Benatallah, A. H. Bouguettaya, A. K. Ngu et al., Business-to-business interactions: issues and enabling technologies, The VLDB Journal, vol.12, issue.1, pp.59-85, 2003.

S. [. Mandell and . Mcilraith, Adapting BPEL4WS for the Semantic Web: The Bottom-Up Approach to Web Service Interoperation, Proceedings of International Semantic Web Conference, 2003.
DOI : 10.1007/978-3-540-39718-2_15

M. [. Milanovic and . Malek, Current solutions for Web service composition, IEEE Internet Computing, vol.8, issue.6, pp.51-59, 2004.
DOI : 10.1109/MIC.2004.58

R. [. Montagut and . Molva, Enabling Pervasive Execution of Workflows, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2005.
DOI : 10.1109/COLCOM.2005.1651227

]. F. Mm06a, R. Montagut, and . Molva, Augmenting Web services composition with transactional requirements, ICWS 2006, IEEE International Conference on Web Services, 2006.

]. F. Mm06b, R. Montagut, and . Molva, Towards transactional pervasive workflowsThe Enterprise Computing Conference, pp.16-20, 2006.

]. F. Mm07a, R. Montagut, and . Molva, Enforcing integrity of execution in distributed workflow management systems, International Conference on Services Computing, 2007.

]. F. Mm07b, R. Montagut, and . Molva, Traceability and integrity of execution in distributed workflow management systems, ESORICS 2007, European Symposium On Research In Computer Security, 2007.

]. F. Mmg08a, R. Montagut, S. T. Molva, and . Golega, Automating the composition of transactional web services, To appear in International Journal of Web Services Research, 2008.

]. F. Mmg08b, R. Montagut, S. T. Molva, and . Golega, The pervasive workflow: A decentralized workflow system supporting long running transactions, IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews. Special Issue on Enterprise Service Computing and Industrial Applications, 2008.

R. [. Mehrotra, A. Rastogi, H. Silberschatz, and . Korth, A transaction model for multidatabase systems, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems, 1992.
DOI : 10.1109/ICDCS.1992.235055

S. [. Mikalsen, I. Tai, and . Rouvellou, Transactional attitudes: Reliable composition of autonomous web services, Workshop on Dependable Middlewarebased Systems, 2002.

. Mww-+-98-]-p, D. Muth, J. Wodtke, A. Weisenfels, G. Dittrich et al., From centralized workflow specification to distributed workflow execution, Journal of Intelligent Information Systems, vol.10, issue.2, pp.159-184, 1998.

S. [. Nanda, V. Chandra, and . Sarkar, Decentralizing composite web services, Proceedings of Workshop on Compilers for Parallel Computing, 2003.
DOI : 10.1145/1035292.1028991

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6392

N. [. Nanda and . Karnik, Synchronization analysis for decentralizing composite web services, SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, pp.407-414, 2003.
DOI : 10.1145/952603.952612

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.4484

A. [. Owens, T. Duffy, and . Dowling, An identity based encryption system, PPPJ '04: Proceedings of the 3rd international symposium on Principles and practice of programming in JavaOWL03] OWL-S specifications, pp.154-159, 2003.

]. M. Pap03 and . Papazoglou, Web services and business transactions, World Wide Web, vol.6, issue.1, pp.49-91, 2003.

]. K. Pat02 and . Paterson, Id-based signatures from pairings on elliptic curves, Electronics Letters, vol.38, issue.18, pp.1025-1026, 2002.

J. [. Park and . Hwang, Role-based access control for collaborative enterprise in peer-to-peer computing environments, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.93-99, 2003.
DOI : 10.1145/775412.775424

[. Pazzaglia, K. Wrona, A. Laube, F. Montagut, L. Gomez et al., Utilisation des informations contextuelles pour assurer la sécurité d'un processus collaboratif distribué : un exemple dans l'e-Santé, OFTA, pp.345-370, 2007.

S. [. Ranganathan and . Mcfaddin, Using workflows to coordinate Web services in pervasive computing environments, Proceedings. IEEE International Conference on Web Services, 2004., pp.288-295, 2004.
DOI : 10.1109/ICWS.2004.1314750

A. [. Rusinkiewicz and . Sheth, Specification and execution of transactional workflows, Modern database systems: the object model, interoperability, and beyond, 1995.

X. [. Rao and . Su, A Survey of Automated Web Service Composition Methods, First International Workshop on Semantic Web Services and Web Process Composition, pp.43-54, 2004.
DOI : 10.1007/978-3-540-30581-1_5

G. [. Schuldt, C. Alonso, H. Beeri, and . Schek, Atomicity and isolation for transactional processes, ACM Transactions on Database Systems, vol.27, issue.1, pp.63-116, 2002.
DOI : 10.1145/507234.507236

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.199

G. [. Schuldt, H. Alonso, and . Schek, Concurrency control and recovery in transactional process management, Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '99, 1999.
DOI : 10.1145/303976.304007

E. [. Sandhu, H. L. Coyne, C. E. Feinstein, and . Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867

D. [. Syverson, M. G. Goldschlag, and . Reed, Anonymous connections and onion routing, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.44-54, 1997.
DOI : 10.1109/SECPRI.1997.601314

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.3883

]. J. Sgs-+-04, S. Sairamesh, I. Goh, S. Stanoi, C. S. Padmanabhan et al., Disconnected processes, mechanisms and architecture for mobile e-business, Mob. Netw. Appl, vol.9, issue.6, pp.651-662, 2004.

R. [. Strandenaes and . Karlsen, Transaction compensation in web services, The Norwegian Computer Science Conference, 2002.

Y. [. Song, R. Labrou, and . Masuoka, Dynamic service discovery and management in task computing, Mobiquitous, vol.00, pp.310-318, 2004.

M. [. Schulz and . Orlowska, Architectural issues for cross-organisational B2B interactions, Proceedings 21st International Conference on Distributed Computing Systems Workshops, pp.79-87, 2001.
DOI : 10.1109/CDCS.2001.918690

R. [. Schuler, H. Weber, H. Schuldt, and . Schek, Peer???to???Peer Process Execution with Osiris, First International Conference on Service-Oriented Computing ICSOC, 2003.
DOI : 10.1007/978-3-540-24593-3_33

M. [. Simon and . Zurko, Separation of duty in role-based environments, Proceedings 10th Computer Security Foundations Workshop, pp.183-194, 1997.
DOI : 10.1109/CSFW.1997.596811

T. [. Tripathi, R. Ahmed, and . Kumar, Specification of secure distributed collaboration systems, The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003., p.149, 2003.
DOI : 10.1109/ISADS.2003.1193943

V. [. Tartanoglu and . Issarny, Specifying Web Service Recovery Support with Conversations, Proceedings of the 38th Annual Hawaii International Conference on System Sciences, pp.167-169, 2005.
DOI : 10.1109/HICSS.2005.552

URL : https://hal.archives-ouvertes.fr/inria-00414944

V. [. Tartanoglu, A. Issarny, N. Romanovsky, and . Levy, Coordinated forward error recovery for composite web services, 22nd Symposium on Reliable Distributed Systems (SRDS), 2003.
URL : https://hal.archives-ouvertes.fr/inria-00414799

R. [. Tai, T. Khalaf, and . Mikalsen, Composition of Coordinated Web Services, Middleware '04: Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware, pp.294-310, 2004.
DOI : 10.1145/944217.944234

X. [. Tsai, Y. Liu, and . Chen, Distributed policy specification and enforcement in service-oriented business systems, IEEE International Conference on e-Business Engineering (ICEBE'05), pp.10-17, 2005.
DOI : 10.1109/ICEBE.2005.52

C. [. Tang, M. C. Liebetruth, and . Jaeger, The owl-s matcher software, 2003.

J. [. Trabelsi, Y. Pazzaglia, and . Roudier, Enabling Secure Discovery in a Pervasive Environment, SPC 2006, 3rd International Conference on Security in Pervasive Computing, 2006.
DOI : 10.1007/11734666_3

. J. Vbs04, P. Vidal, C. Buhler, and . Stahl, Multiagent systems with workflows, Internet Computing, vol.8, issue.81, pp.76-82, 2004.

]. A. Wan00 and . Wang, Using software agents to support evolution of distributed workflow models, Proc. International ICSC Symposium on Interactive and Collaborative Computing, 2000.

]. M. Wei91 and . Weiser, The computer for the 21st century, Scientific American, pp.94-110, 1991.

M. Wimmer, A. Kemper, M. Rits, and V. Lotz, Consolidating the Access Control of Composite Applications and Workflows, DBSec, pp.44-59, 2006.
DOI : 10.1007/978-3-540-27834-4_61

H. [. Weikum and . Schek, Concepts and applications of multilevel transactions and open nested transactions, Database Transaction Models for Advanced Applications, pp.515-553, 1992.

Z. [. Wonohoesodo and . Tari, A role based access control for web services, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004, pp.49-56, 2004.
DOI : 10.1109/SCC.2004.1357989

J. [. Yang, B. C. Hsieh, J. Lan, and . Chung, Composition and evaluation of trustworthy web services, BSN '05: Proceedings of the IEEE EEE05 international workshop on Business services networks, pp.5-5, 2005.
DOI : 10.1504/IJWGS.2006.008877