P. Ayrault, T. Hardin, and F. Pessaux, Development of a Generic Voter under FoCal, Tests and Proofs, Third Int. Conf., TAP 2009, Proceedings, pp.10-26, 2009.
DOI : 10.1017/CBO9780511624162

URL : https://hal.archives-ouvertes.fr/hal-01241361

P. Ayrault, T. Hardin, and F. Pessaux, Development Life-cycle of Critical Software Under FoCaL, Electronic Notes in Theoretical Computer Science, vol.243, pp.15-31, 2009.
DOI : 10.1016/j.entcs.2009.07.003

URL : https://hal.archives-ouvertes.fr/hal-01195843

D. Bell and L. Lapadula, Secure Computer Systems: a Mathematical Model, MITRE Corp, 1973.

R. Bonichon, D. Delahaye, and D. Doligez, Zenon: An Extensible Automated Theorem Prover Producing Checkable Proofs, Logic for Programming, Artificial Intelligence, and Reasoning , 14th Int. Conf., LPAR, pp.151-165, 2007.
DOI : 10.1007/978-3-540-75560-9_13

URL : https://hal.archives-ouvertes.fr/inria-00315920

S. Boulmé, T. Hardin, and R. Rioboo, Some hints for polynomials in the Foc project, 9th Symp. on the Integration of Symbolic Computation and Mechanized Reasoning, 2001.

T. Bourdier, H. Cirstea, M. Jaume, and H. Kirchner, Formal Specification and Validation of Security Policies, Foundations & Practice of Security, pp.148-163, 2011.
DOI : 10.1007/978-3-642-27901-0_12

URL : https://hal.archives-ouvertes.fr/inria-00507300

A. Bove, P. Dybjer, and U. Norell, A Brief Overview of Agda ??? A Functional Language with Dependent Types, Theorem Proving in Higher Order Logics, 22nd Int. Conf., TPHOLs 2009, Proceedings, pp.73-78, 2009.
DOI : 10.1007/978-3-540-87827-8_28

M. Carlier and C. Dubois, Functional Testing in the Focal Environment, Tests and Proofs, Second Int. Conf., TAP 2008, Proceedings, pp.84-98, 2008.
DOI : 10.1007/978-3-540-79124-9_7

URL : https://hal.archives-ouvertes.fr/hal-01125411

M. Carlier, C. Dubois, and A. Gotlieb, Constraint reasoning in FocalTest, ICSOFT 2010 -Proceedings of the Fifth Int. Conf. on Software and Data Technologies, pp.82-91, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00699233

. Coq, The Coq Proof Assistant, Tutorial and reference manual Distribution available at, 2010.

]. D. Delahaye, J. Etienne, and V. Donzeau-gouge, Certifying Airport Security Regulations Using the Focal Environment, FM 2006: 14th Int. Symp. on Formal Methods, pp.48-63, 2006.
DOI : 10.1007/11813040_4

URL : https://hal.archives-ouvertes.fr/hal-01125368

D. Delahaye, C. Dubois, and P. Tollite, Génération de code fonctionnel certifiécertifié`certifiéà partir de spécifications inductives dans l'environnement Focalize, 21th Journées Francophones des Langages Applicatifs, 2010.

. Focalize and . Focalize, Tutorial and reference manual Distribution available at, p.6, 2010.

M. Harrison, W. Ruzzo, and J. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

M. Jaume, Security Rules versus Security Properties, Information Systems Security -6th Int. Conf., ICISS, pp.231-245, 2010.
DOI : 10.1007/978-3-642-17714-9_17

URL : https://hal.archives-ouvertes.fr/hal-00593937

M. Jaume, V. Viet-triem, L. Tong, and . Mé, Flow Based Interpretation of Access Control: Detection of Illegal Information Flows, Information Systems Security -7th Int. Conf., ICISS, pp.72-86, 2011.
DOI : 10.1007/978-3-540-39650-5_17

URL : https://hal.archives-ouvertes.fr/hal-00647170

L. Lamport, How to write a proof AMM: The American Mathematical Monthly, pp.600-608, 1995.

X. Leroy, D. Doligez, J. Garrigue, D. Rémy, and J. Vouillon, The Objective Caml system, Documentation and user's manual , release 3, 2003.

V. Prevosto and D. Doligez, Algorithms and proof inheritance in the Foc language, Journal of Automated Reasoning, vol.29, issue.3/4, pp.337-363, 2002.
DOI : 10.1023/A:1021979218446

V. Prevosto and M. Jaume, Making proofs in a hierarchy of mathematical structures, 11th Symp. on the Integration of Symbolic Computation and Mechanized Reasoning, pp.89-100, 2003.

R. Rioboo, Invariants for the FoCaL language, Annals of Mathematics and Artificial Intelligence, vol.29, issue.3???4, pp.273-296, 2009.
DOI : 10.1007/s10472-009-9156-3

N. Stouls and M. Potet, Security policy enforcement through refinement process Formal Specification and Development in B, 7th Int. Conf. of B Users, LNCS, vol.4355, pp.216-231, 2007.