M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

M. Backes, G. Doychev, and B. Köpf, Preventing side-channel leaks in web traffic: A formal approach, NDSS. The Internet Society, 2013.

F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, p.2013
URL : https://hal.archives-ouvertes.fr/hal-01242614

F. Biondi, A. Legay, B. F. Nielsen, P. Malacaria, and A. Wasowski, Information leakage of non-terminating processes, pp.517-529
URL : https://hal.archives-ouvertes.fr/hal-01086879

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A Quantitative Security Analyzer for Imperative Code, p.2013
DOI : 10.1007/978-3-642-39799-8_49

URL : https://hal.archives-ouvertes.fr/hal-01242615

M. Boreale, Quantifying information leakage in process calculi, Information and Computation, vol.207, issue.6, pp.699-725, 2009.
DOI : 10.1016/j.ic.2008.12.007

M. Boreale and M. G. Buscemi, Experimenting with STA, a tool for automatic analysis of security protocols, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.281-285, 2002.
DOI : 10.1145/508791.508847

M. Boreale, D. Clark, and D. Gorla, A semiring-based trace semantics for processes with applications to information leakage analysis, Mathematical Structures in Computer Science, vol.323, issue.02, pp.259-291, 2015.
DOI : 10.1016/j.ic.2007.07.003

URL : https://hal.archives-ouvertes.fr/hal-01054448

M. Boreale and F. Pampaloni, Quantitative information flow under generic leakage functions and adaptive adversaries, p.2014
URL : https://hal.archives-ouvertes.fr/hal-01398015

D. Bytschkow, J. Quilbeuf, G. Igna, and H. Ruess, Distributed MILS Architectural Approach for Secure Smart Grids, SmartGridSec, pp.16-29, 2014.
DOI : 10.1007/978-3-319-10329-7_2

R. Chadha, U. Mathur, and S. Schwoon, Computing information flow using symbolic modelchecking, pp.505-516
URL : https://hal.archives-ouvertes.fr/hal-01110118

T. Chothia and A. Guha, A Statistical Test for Information Leaks Using Continuous Mutual Information, 2011 IEEE 24th Computer Security Foundations Symposium, pp.177-190, 2011.
DOI : 10.1109/CSF.2011.19

T. Chothia, Y. Kawamoto, and C. Novakovic, LeakWatch: Estimating Information Leakage from Java Programs, Lecture Notes in Computer Science, vol.8713, pp.219-236, 2014.
DOI : 10.1007/978-3-319-11212-1_13

URL : https://hal.archives-ouvertes.fr/hal-01097603

T. Chothia, Y. Kawamoto, C. Novakovic, and D. Parker, Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013.
DOI : 10.1109/CSF.2013.20

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

J. Esparza, S. Kiefer, and S. Schwoon, Abstraction Refinement with Craig Interpolation and Symbolic Pushdown Systems, Journal on Satisfiability Boolean Modeling and Computation, vol.22, pp.27-56, 2008.
DOI : 10.2307/2963593

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

J. W. Iii, Toward a mathematical foundation for information flow security, IEEE Symposium on Security and Privacy, pp.21-35, 1991.

M. G. Kang, S. Mccamant, P. Poosankam, and D. Song, DTA++: dynamic taint analysis with targeted control-flow propagation, NDSS, 2011.

B. Köpf, L. Mauborgne, and M. Ochoa, Automatic Quantification of Cache Side-Channels, CAV, pp.564-580, 2012.
DOI : 10.1007/978-3-642-31424-7_40

D. Koss, F. Sellmayr, S. Bauereiß, D. Bytschkow, P. K. Gupta et al., Establishing a smart grid node architecture and demonstrator in an office environment using the SOA approach, 2012 First International Workshop on Software Engineering Challenges for the Smart Grid (SE-SmartGrids), pp.8-14, 2012.
DOI : 10.1109/SE4SG.2012.6225710

J. Newsome, S. Mccamant, and D. Song, Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, 2009.
DOI : 10.1145/1554339.1554349

P. Norris, Electoral Engineering: Voting Rules and Political Behavior. Cambridge Studies in Comparative Politics, 2004.

Q. Phan and P. Malacaria, Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014.
DOI : 10.1145/2590296.2590328

Q. Phan, P. Malacaria, C. S. Pasareanu, and M. Amorim, Quantifying information leaks using reliability analysis, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, SPIN 2014, pp.105-108, 2014.
DOI : 10.1145/2632362.2632367

Q. Phan, P. Malacaria, O. Tkachuk, and C. S. Pasareanu, Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012.
DOI : 10.1145/2382756.2382791

C. Rottondi, S. Fontana, and G. Verticale, A Privacy-Friendly Framework for Vehicle-to-Grid Interactions, Lecture Notes in Computer Science, vol.8448, pp.125-138, 2014.
DOI : 10.1007/978-3-319-10329-7_8

G. Smith, On the Foundations of Quantitative Information Flow, Lecture Notes in Computer Science, vol.38, issue.1, pp.288-302, 2009.
DOI : 10.1137/060651380