Combining behavioural types with security analysis, Journal of Logical and Algebraic Methods in Programming, vol.84, issue.6, pp.763-780, 2015. ,
DOI : 10.1016/j.jlamp.2015.09.003
URL : https://hal.archives-ouvertes.fr/hal-01213201
Synchronous Multiparty Session Types, Proc. PLACES, ENTCS 241, pp.3-33, 2009. ,
DOI : 10.1016/j.entcs.2009.06.002
Typing Access Control and Secure Information Flow in Sessions. Information and Computation 238, pp.68-105, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01088782
Information Flow Safety in Multiparty Sessions, Mathematical Structures in Computer Science, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01237236
Precise subtyping for synchronous multiparty sessions, Proc. PLACES, EPTCS 203, pp.29-44, 2016. ,
DOI : 10.4204/EPTCS.203.3
Multiparty Asynchronous Session Types, Proc. POPL, pp.273-284, 2008. ,
Dependent Information Flow Types, Proc. POPL, pp.317-32810, 2015. ,
Types and Programming Languages, 2002. ,
Declassification: Dimensions and principles, Journal of Computer Security, vol.17, issue.5, pp.517-54810, 2009. ,
DOI : 10.3233/JCS-2009-0352