J. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

J. Rushby, Noninterference, transitivity, and channel-control security policies, SRI International, 1992.

R. Focardi and R. Gorrieri, Classification of security properties (part i: Information flow), pp.331-396, 2000.

N. Busi and R. Gorrieri, Structural non-interference in elementary and trace nets, Mathematical Structures in Computer Science, vol.1491, issue.06, pp.1065-1090, 2009.
DOI : 10.1016/j.entcs.2004.02.006

R. Gorrieri and M. Vernali, On Intransitive Non-interference in Some Models of Concurrency, FOSAD VI Tutorial Lectures, ser. LNCS, pp.125-151, 2011.
DOI : 10.1109/CSFW.1999.779775

E. Best, P. Darondeau, and R. Gorrieri, On the Decidability of Non Interference over Unbounded Petri Nets, Proc. of SecCo, ser. EPTCS, pp.16-33, 2010.
DOI : 10.4204/EPTCS.51.2

URL : https://hal.archives-ouvertes.fr/inria-00591568

E. Best and P. Darondeau, Deciding Selective Declassification of Petri Nets, Proc. of POST 2012, ser. LNCS, pp.290-308, 2012.
DOI : 10.1007/978-3-642-28641-4_16

URL : https://hal.archives-ouvertes.fr/hal-00745298

P. Baldan and A. Carraro, Non-interference by Unfolding, Petri Nets, ser, pp.190-209, 2014.
DOI : 10.1007/s002360000041

D. D. 'souza, R. Holla, K. Raghavendra, and B. Sprick, Model-checking trace-based information flow properties*, Journal of Computer Security, vol.19, issue.1, pp.101-138, 2011.
DOI : 10.3233/JCS-2010-0400

B. Bérard and J. Mullins, Verification of information flow properties under rational observation, Proc. of AVOCS 2014, 2014.

A. Muscholl and D. Peled, Message Sequence Graphs and Decision Problems on Mazurkiewicz Traces, MFCS, pp.81-91, 1999.
DOI : 10.1007/3-540-48340-3_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.7078

B. Caillaud, P. Darondeau, L. Hélouët, and G. Lesventes, HMSCs en tant que spécifications partielles et leurs complétions dans les réseaux de Petri, 2000.

B. Genest, L. Hélouët, and A. Muscholl, High-Level Message Sequence Charts and Projections, CONCUR, ser. LNCS, pp.308-322, 2003.
DOI : 10.1007/978-3-540-45187-7_21

A. Muscholl and D. Peled, Analyzing message sequence charts, SAM 2000, 2nd Workshop on SDL and MSC, pp.3-17, 2000.

A. Ray, B. Sengupta, and R. Cleaveland, Secure Requirements Elicitation Through Triggered Message Sequence Charts, ICDCIT 2004, ser. LNCS, pp.273-282, 2004.
DOI : 10.1007/978-3-540-30555-2_32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.5767