M. Ancona, W. Cazzola, and E. B. Fernandez, Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks, Secure Internet Programming, pp.35-49, 1999.
DOI : 10.1007/3-540-48749-2_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.5984

G. Bracha and D. Ungar, Mirrors: Design principles for metalevel facilities of object-oriented programming languages, Proceedings of OOPSLA'04, pp.331-344, 2004.

M. Büchi and W. Weck, Generic Wrappers, Proceedings of ECOOP'00, pp.201-225, 2000.
DOI : 10.1007/3-540-45102-1_10

D. Caromel and J. Vayssière, Reflections on MOP s, Components, and Java Security, Proceedings of ECOOP'01, pp.256-274, 2001.
DOI : 10.1007/3-540-45337-7_14

D. Caromel, F. Huet, and J. Vayssière, A simple security???Aware MOP for Java, Proceedings of the International Conference on Metalevel Architectures and Separation of Crosscutting Concerns (REFLECTION), pp.118-125, 2001.
DOI : 10.1007/3-540-45429-2_9

D. G. Clarke, J. M. Potter, and J. Noble, Ownership types for flexible alias protection, Proceedings of OOPSLA'98, pp.48-64, 1998.
DOI : 10.1145/286942.286947

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.2115

D. G. Clarke, J. Noble, and J. M. Potter, Simple Ownership Types for Object Containment, Proceedings of ECOOP'01, pp.53-76, 2001.
DOI : 10.1007/3-540-45337-7_4

D. G. Clarke, J. Östlund, I. Sergey, and T. Wrigstad, Ownership Types: A Survey, Aliasing in Object-Oriented Programming. Types, Analysis and Verification, pp.15-58, 2013.
DOI : 10.1007/978-3-642-36946-9_3

W. De-meuter, E. Tanter, S. Mostinckx, T. Van-cutsem, and J. Dedecker, Flexible object encapsulation for ambient-oriented programming, Proceedings of the 2005 conference on Dynamic languages symposium , DLS '05, pp.11-21, 2005.
DOI : 10.1145/1146841.1146843

P. Eugster, Uniform proxies for Java, Proceedings of OOPSLA'06, pp.139-152, 2006.

J. Ferber, Computational reflection in class-based object-oriented languages, Proceedings of OOPSLA'89, pp.317-326, 1989.

D. Gordon and J. Noble, Dynamic ownership in a dynamic language, Proceedings of the 2007 symposium on Dynamic languages , DLS '07, pp.41-52, 2007.
DOI : 10.1145/1297081.1297090

G. Kiczales, J. Des-rivières, and D. G. Bobrow, The Art of the Metaobject Protocol, 1991.

P. Maes, Concepts and experiments in computational reflection, Proceedings of OOPSLA'87, pp.147-155, 1987.

A. Mettler, D. Wagner, and T. Close, Joe-E: A security-oriented subset of java, Proceedings of the Symposium on Network and Distributed System Security (NDSS), pp.357-374, 2010.

M. S. Miller, Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control, 2006.

M. S. Miller and J. S. Shapiro, Paradigm Regained: Abstraction Mechanisms for Access Control, Advances in Computing Science?ASIAN 2003. Progamming Languages and Distributed Computation, pp.224-242, 2003.
DOI : 10.1007/978-3-540-40965-6_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.208.7297

S. Mostinckx, T. Van-cutsem, S. Timbermont, E. Gonzalez-boix, E. Tanter et al., Mirror-based reflection in ambienttalk . Software: Practice and Experience, pp.661-699, 2009.

J. Noble, J. Vitek, and J. Potter, Flexible alias protection, Proceedings of ECOOP'98, pp.158-185, 1998.
DOI : 10.1007/BFb0054091

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.4971

J. Noble, D. Clarke, and J. Potter, Object ownership for dynamic alias protection, Proceedings Technology of Object-Oriented Languages and Systems. TOOLS 32, pp.176-187, 1999.
DOI : 10.1109/TOOLS.1999.809424

G. A. Pascoe, Encapsulators: A new software paradigm in smalltalk- 80, Proceedings of OOPSLA'86, pp.341-346, 1986.

M. M. Peck, N. Bouraqadi, L. Fabresse, M. Denker, and C. Teruel, Ghost: A uniform and general-purpose proxy implementation, Science of Computer Programming, vol.98, pp.339-359, 2015.
DOI : 10.1016/j.scico.2014.05.015

URL : https://hal.archives-ouvertes.fr/hal-00877757

T. Riechmann and F. J. Hauck, Meta objects for access control, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.17-22, 1997.
DOI : 10.1145/283699.283735

T. Riechmann and J. Kleinöder, Meta objects for access control: Role-based principals, Proceedings of the Australasian Conference on Information Security and Privacy (ACISP), pp.296-307, 1998.
DOI : 10.1007/BFb0053742

B. C. Smith, Reflection and semantics in LISP, Proceedings of the 11th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '84, pp.23-35, 1984.
DOI : 10.1145/800017.800513

T. Van-cutsem and M. S. Miller, Proxies: Design principles for robust object-oriented intercession APIs, Proceedings of DLS'10, pp.59-72, 2010.

T. Van-cutsem and M. S. Miller, Trustworthy Proxies, Proceedings of ECOOP'13, pp.154-178, 2013.
DOI : 10.1007/978-3-642-39038-8_7