M. Abadi and G. Plotkin, A model of cooperative threads, Proceedings POPL 2009, pp.29-40, 2009.

A. Almeida-matos, G. Boudol, and I. Castellani, Typing noninterference for reactive programs, The Journal of Logic and Algebraic Programming, vol.72, issue.2, pp.124-156, 2007.
DOI : 10.1016/j.jlap.2007.02.009

URL : https://hal.archives-ouvertes.fr/inria-00070413

R. Amadio and F. Dabrowski, Feasible Reactivity for Synchronous Cooperative Threads, Electronic Notes in Theoretical Computer Science, vol.154, issue.3, pp.33-43, 2006.
DOI : 10.1016/j.entcs.2006.05.005

URL : https://hal.archives-ouvertes.fr/hal-00147244

M. Roberto and . Amadio, The SL synchronous language, revisited. The Journal of Logic and Algebraic Programming, pp.121-150, 2007.

G. Berry and G. Gonthier, The Esterel synchronous programming language: design, semantics, implementation, Science of Computer Programming, vol.19, issue.2, 1992.
DOI : 10.1016/0167-6423(92)90005-V

URL : https://hal.archives-ouvertes.fr/inria-00075711

A. Bohannon, B. C. Pierce, V. Sjöberg, S. Weirich, and S. Zdancewic, Reactive noninterference, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.79-90, 2009.
DOI : 10.1145/1653662.1653673

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Boudol and I. Castellani, Noninterference for concurrent programs and thread systems, Theoretical Computer Science, vol.281, issue.1-2, pp.109-130, 2002.
DOI : 10.1016/S0304-3975(02)00010-5

URL : https://hal.archives-ouvertes.fr/inria-00072334

F. Boussinot and R. De-simone, The SL synchronous language, IEEE Transactions on Software Engineering, vol.22, issue.4, pp.256-266, 1996.
DOI : 10.1109/32.491649

URL : https://hal.archives-ouvertes.fr/inria-00074168

F. Boussinot and J. Susini, The SugarCubes Tool Box: A Reactive Java Framework . Software: Practice and Experience, pp.1531-1550, 1998.

R. Focardi and R. Gorrieri, Classification of security properties (part i: Information flow, Foundations of Security Analysis and Design -Tutorial Lectures, number 2171 in LNCS, 2001.

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

J. A. Goguen and J. Meseguer, Unwinding and Inference Control, 1984 IEEE Symposium on Security and Privacy, 1984.
DOI : 10.1109/SP.1984.10019

A. Russo and A. Sabelfeld, Security for Multithreaded Programs Under Cooperative Scheduling, Ershov Memorial Conference, pp.474-480, 2007.
DOI : 10.1007/978-3-540-70881-0_43

A. Russo, D. Zanarini, and M. Jaskelioff, Precise enforcement of confidentiality for reactive systems, Proceedings of the 26th IEEE Computer Security Foundations Symposium. IEEE, 2013.

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Smith, A new type system for secure information flow, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930141

D. Volpano, G. Smith, and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.
DOI : 10.3233/JCS-1996-42-304