Action Refinement in Process Algebra and Security Issues, LOPSTR, pp.201-217, 2007. ,
DOI : 10.1145/362575.362577
A refinement-based process algebra for timed automata, Formal Aspects of Computing, vol.17, issue.2, pp.138-159, 2005. ,
DOI : 10.1007/s00165-005-0064-y
A taxonomy of security properties for ccs, CSFW'94, pp.126-136, 1994. ,
Classification of security properties (part I: Information flow), FOSAD '00, pp.331-396, 2001. ,
Classification of security properties -part ii: Network security, FOSAD, volume 2946 of Lecture Notes in Computer Science, pp.139-185, 2002. ,
A Uniform Approach for the Definition of Security Properties, FM '99, pp.794-813, 1999. ,
DOI : 10.1007/3-540-48119-2_44
Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability, Electronic Notes in Theoretical Computer Science, vol.99, pp.111-126, 2004. ,
DOI : 10.1016/j.entcs.2004.02.005
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
Possibilistic Information Flow Control in MAKS and Action Refinement, ETRICS, pp.268-281, 2006. ,
DOI : 10.1007/11766155_19
Secrecy-Preserving Refinement, FME '01, pp.135-152, 2001. ,
DOI : 10.1007/3-540-45251-6_8
Automated policy-refinement for managing composite services, 2004. ,
Compositionality Through an Operational Semantics of Contexts, Journal of Logic and Computation, vol.1, issue.6, pp.761-795, 1991. ,
DOI : 10.1093/logcom/1.6.761
A Uniform Approach to Security and Fault-Tolerance Specification and Analysis, WADS, pp.172-201, 2008. ,
DOI : 10.1007/978-3-642-10248-6_8
Analysis of security protocols as open systems, Theoretical Computer Science, vol.290, issue.1, pp.1057-1106, 2003. ,
DOI : 10.1016/S0304-3975(02)00596-0
Idea: Action Refinement for Security Properties Enforcement, Engineering Secure Software and Systems, First International Symposium ESSoS, pp.37-42, 2009. ,
DOI : 10.1007/11955757_18
A framework for automatic generation of security controller, Software Testing, Verification and Reliability, vol.303, issue.1-2, 2010. ,
DOI : 10.1002/stvr.441
URL : https://hal.archives-ouvertes.fr/inria-00536752
Operational and algebraic semantics of concurrent processes Handbook of Theoretical Computer Science, volume B: Formal Models and Semantics, chapter 19, pp.1201-1242, 1990. ,
Communicating and mobile systems: the ?-calculus, 1999. ,
Vertical Implementation, Information and Computation, vol.170, issue.1, pp.95-133, 2001. ,
DOI : 10.1006/inco.2001.2967
URL : http://doi.org/10.1006/inco.2001.2967
On the expressive power of CSP refinement, Formal Aspects of Computing, vol.17, issue.2, pp.93-112, 2005. ,
DOI : 10.1007/s00165-005-0065-x
Preservation of probabilistic information flow under refinement, Information and Computation, vol.206, issue.2-4, pp.213-249, 2008. ,
DOI : 10.1016/j.ic.2007.07.008
Security Policy Enforcement Through Refinement Process, The 7th International B Conference, 2007. ,
DOI : 10.1007/11955757_18
URL : https://hal.archives-ouvertes.fr/inria-00384182
Architectural refinement and notions of intransitive noninterference, ESSoS'09, pp.60-74 ,
Program development by stepwise refinement, Communications of the ACM, vol.14, issue.4, pp.221-227, 1971. ,
DOI : 10.1145/362575.362577