P. G. Allen, A comparison of non-interference and non-deducibility using CSP, Proceedings Computer Security Foundations Workshop IV, pp.43-54, 1991.
DOI : 10.1109/CSFW.1991.151568

M. Backes and B. Pfitzmann, Intransitive non-interference for cryptographic purposes, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.140-152, 2003.
DOI : 10.1109/SECPRI.2003.1199333

K. Engelhardt, R. Van-der-meyden, and C. Zhang, Intransitive noninterference in nondeterministic systems, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.869-880, 2012.
DOI : 10.1145/2382196.2382288

A. Joseph, J. Goguen, and . Meseguer, Security policies and security models, Proceedings of S&P, pp.11-20, 1982.

A. Joseph, J. Goguen, and . Meseguer, Unwinding and inference control, IEEE Symposium on Security and Privacy, pp.75-75, 1984.

W. James and I. Gray, Probabilistic interference, Proceedings of S&P, pp.170-179, 1990.

D. Korzhyk, Z. Yin, C. Kiekintveld, V. Conitzer, and M. Tambe, Stackelberg vs. Nash in security games: An extended investigation of interchangeability, equivalence , and uniqueness, Journal of Artif. Intell. Research, vol.41, pp.297-327, 2011.

B. W. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

P. Li and S. Zdancewic, Downgrading policies and relaxed noninterference, ACM SIGPLAN Notices, vol.40, issue.1, pp.158-170, 2005.
DOI : 10.1145/1047659.1040319

D. Mccullough, Noninterference and the composability of security properties, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.177-186, 1988.
DOI : 10.1109/SECPRI.1988.8110

A. Mciver and C. Morgan, A probabilistic approach to information hiding, Programming Methodology, pp.441-460, 2003.
DOI : 10.1007/978-0-387-21798-7_20

O. Colin and . Halloran, A calculus of information flow, Proceedings of ESORICS, pp.147-159, 1990.

A. Di-pierro, C. Hankin, and H. Wiklicky, Approximate non-interference, Journal of Computer Security, vol.12, issue.1, pp.37-81, 2004.
DOI : 10.3233/JCS-2004-12103

A. W. Roscoe, CSP and determinism in security modelling, Proceedings 1995 IEEE Symposium on Security and Privacy, pp.114-127, 1995.
DOI : 10.1109/SECPRI.1995.398927

A. W. Roscoe and M. H. Goldsmith, What is intransitive noninterference?, Proceedings of the 12th IEEE Computer Security Foundations Workshop, pp.228-228, 1999.
DOI : 10.1109/CSFW.1999.779776

A. W. Roscoe, J. C. Woodcock, and L. Wulf, Non-interference through determinism, Proceedings of ESORICS, pp.31-53, 1994.

J. Rushby, Noninterference, transitivity, and channel-control security policies. SRI International, 1992.

Y. Peter, . Ryan, A. Steve, and . Schneider, Process algebra and non-interference, Journal of Computer Security, vol.9, issue.1, pp.75-103, 2001.

. Ph and . Schnoebelen, The complexity of temporal model checking, Advances in Modal Logics, Proceedings of AiML 2002, 2003.

F. Seehusen and K. Stølen, Information flow security, abstraction and composition, IET Information Security, vol.3, issue.1, pp.9-33, 2009.
DOI : 10.1049/iet-ifs:20080069

G. Smith, On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, pp.288-302, 2009.
DOI : 10.1137/060651380

D. Sutherland, A model of information, Proc. 9th National Computer Security Conference, pp.175-183, 1986.

M. Tabatabaei, W. Jamroga, and P. Y. Ryan, Preventing coercion in e-voting: Be open and commit, Proceedings of the 1st Workshop on Hot issues in Security Principles and Trust (HotSpot), 2013.

R. Van-der-meyden and C. Zhang, A comparison of semantic models for noninterference, Theoretical Computer Science, vol.411, issue.47, pp.4123-4147, 2010.
DOI : 10.1016/j.tcs.2010.08.013

R. Van-der-meyden, What, indeed, is intransitive noninterference?, Proceedings of ESORICS, pp.235-250, 2007.

J. T. Wittbold and D. M. Johnson, Information flow in nondeterministic systems, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.144-144, 1990.
DOI : 10.1109/RISP.1990.63846

A. Zakinthinos and E. Stewart-lee, The Composability of Non-Interference, Journal of Computer Security, vol.3, issue.4, pp.269-281, 1995.
DOI : 10.3233/JCS-1994/1995-3404

S. Zdancewic, Challenges for information-flow security, Proceedings of the 1st International Workshop on the Programming Language Interference and Dependence (PLID04), 2004.