A. Bossi, C. Piazza, and S. Rossi, Action Refinement in Process Algebra and Security Issues, LOPSTR, pp.201-217, 2007.
DOI : 10.1145/362575.362577

S. Cattani and M. Kwiatkowska, A refinement-based process algebra for timed automata, Formal Aspects of Computing, vol.17, issue.2, pp.138-159, 2005.
DOI : 10.1007/s00165-005-0064-y

R. Focardi and R. Gorrieri, A taxonomy of security properties for ccs, CSFW'94, pp.126-136, 1994.

R. Focardi and R. Gorrieri, Classification of security properties (part I: Information flow), FOSAD '00, pp.331-396, 2001.

R. Focardi, R. Gorrieri, and F. Martinelli, Classification of security properties -part ii: Network security, FOSAD, volume 2946 of Lecture Notes in Computer Science, pp.139-185, 2002.

R. Focardi and F. Martinelli, A Uniform Approach for the Definition of Security Properties, FM '99, pp.794-813, 1999.
DOI : 10.1007/3-540-48119-2_44

S. Gnesi, G. Lenzini, and F. Martinelli, Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability, Electronic Notes in Theoretical Computer Science, vol.99, pp.111-126, 2004.
DOI : 10.1016/j.entcs.2004.02.005

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

D. Hutter, Possibilistic Information Flow Control in MAKS and Action Refinement, ETRICS, pp.268-281, 2006.
DOI : 10.1007/11766155_19

J. Jurjens, Secrecy-Preserving Refinement, FME '01, pp.135-152, 2001.
DOI : 10.1007/3-540-45251-6_8

V. W. Carey and D. Lewis, Automated policy-refinement for managing composite services, 2004.

K. G. Larsen and L. Xinxin, Compositionality Through an Operational Semantics of Contexts, Journal of Logic and Computation, vol.1, issue.6, pp.761-795, 1991.
DOI : 10.1093/logcom/1.6.761

G. Lenzini, F. Martinelli, I. Matteucci, and S. Gnesi, A Uniform Approach to Security and Fault-Tolerance Specification and Analysis, WADS, pp.172-201, 2008.
DOI : 10.1007/978-3-642-10248-6_8

F. Martinelli, Analysis of security protocols as open systems, Theoretical Computer Science, vol.290, issue.1, pp.1057-1106, 2003.
DOI : 10.1016/S0304-3975(02)00596-0

F. Martinelli and I. Matteucci, Idea: Action Refinement for Security Properties Enforcement, Engineering Secure Software and Systems, First International Symposium ESSoS, pp.37-42, 2009.
DOI : 10.1007/11955757_18

F. Martinelli and I. Matteucci, A framework for automatic generation of security controller, Software Testing, Verification and Reliability, vol.303, issue.1-2, 2010.
DOI : 10.1002/stvr.441

URL : https://hal.archives-ouvertes.fr/inria-00536752

R. Milner, Operational and algebraic semantics of concurrent processes Handbook of Theoretical Computer Science, volume B: Formal Models and Semantics, chapter 19, pp.1201-1242, 1990.

R. Milner, Communicating and mobile systems: the ?-calculus, 1999.

A. Rensink and R. Gorrieri, Vertical Implementation, Information and Computation, vol.170, issue.1, pp.95-133, 2001.
DOI : 10.1006/inco.2001.2967

URL : http://doi.org/10.1006/inco.2001.2967

A. W. Roscoe, On the expressive power of CSP refinement, Formal Aspects of Computing, vol.17, issue.2, pp.93-112, 2005.
DOI : 10.1007/s00165-005-0065-x

T. Santen, Preservation of probabilistic information flow under refinement, Information and Computation, vol.206, issue.2-4, pp.213-249, 2008.
DOI : 10.1016/j.ic.2007.07.008

N. Stouls and M. L. Potet, Security Policy Enforcement Through Refinement Process, The 7th International B Conference, 2007.
DOI : 10.1007/11955757_18

URL : https://hal.archives-ouvertes.fr/inria-00384182

R. Van-der-meyden, Architectural refinement and notions of intransitive noninterference, ESSoS'09, pp.60-74

N. Wirth, Program development by stepwise refinement, Communications of the ACM, vol.14, issue.4, pp.221-227, 1971.
DOI : 10.1145/362575.362577