A model of cooperative threads, Proceedings POPL 2009, pp.29-40, 2009. ,
Typing noninterference for reactive programs, The Journal of Logic and Algebraic Programming, vol.72, issue.2, pp.124-156, 2007. ,
DOI : 10.1016/j.jlap.2007.02.009
URL : https://hal.archives-ouvertes.fr/inria-00070413
Feasible Reactivity for Synchronous Cooperative Threads, Electronic Notes in Theoretical Computer Science, vol.154, issue.3, pp.33-43, 2006. ,
DOI : 10.1016/j.entcs.2006.05.005
URL : https://hal.archives-ouvertes.fr/hal-00147244
The SL synchronous language, revisited. The Journal of Logic and Algebraic Programming, pp.121-150, 2007. ,
The Esterel synchronous programming language: design, semantics, implementation, Science of Computer Programming, vol.19, issue.2, 1992. ,
DOI : 10.1016/0167-6423(92)90005-V
URL : https://hal.archives-ouvertes.fr/inria-00075711
Reactive noninterference, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.79-90, 2009. ,
DOI : 10.1145/1653662.1653673
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.3298
Noninterference for concurrent programs and thread systems, Theoretical Computer Science, vol.281, issue.1-2, pp.109-130, 2002. ,
DOI : 10.1016/S0304-3975(02)00010-5
URL : https://hal.archives-ouvertes.fr/inria-00072334
The SL synchronous language, IEEE Transactions on Software Engineering, vol.22, issue.4, pp.256-266, 1996. ,
DOI : 10.1109/32.491649
URL : https://hal.archives-ouvertes.fr/inria-00074168
The SugarCubes Tool Box: A Reactive Java Framework . Software: Practice and Experience, pp.1531-1550, 1998. ,
Classification of security properties (part i: Information flow, Foundations of Security Analysis and Design -Tutorial Lectures, number 2171 in LNCS, 2001. ,
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
Unwinding and Inference Control, 1984 IEEE Symposium on Security and Privacy, 1984. ,
DOI : 10.1109/SP.1984.10019
Security for Multithreaded Programs Under Cooperative Scheduling, Ershov Memorial Conference, pp.474-480, 2007. ,
DOI : 10.1007/978-3-540-70881-0_43
Precise enforcement of confidentiality for reactive systems, Proceedings of the 26th IEEE Computer Security Foundations Symposium. IEEE, 2013. ,
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979
A new type system for secure information flow, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930141
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304