Multiple Facets for Dynamic Information Flow, POPL 2012, pp.165-178, 2012. ,
Tight Enforcement of Information-Release Policies for Dynamic Languages, 2009 22nd IEEE Computer Security Foundations Symposium, pp.43-59, 2009. ,
DOI : 10.1109/CSF.2009.22
Access control for mobile agents, ACM Transactions on Programming Languages and Systems, vol.26, issue.1, pp.57-124, 2004. ,
DOI : 10.1145/963778.963781
URL : https://hal.archives-ouvertes.fr/hal-00152525
Ilaria Castellani, and Mariangiola Dezani-Ciancaglini. A Reputation System for Multirole Sessions, TGC 2011, pp.1-24, 2012. ,
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, CSF 2009, pp.124-140, 2009. ,
Monitoring Networks through Multiparty Session Types, FMOODS/FORTE 2013, pp.50-65, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01213683
Combining behavioural types with security analysis, Journal of Logical and Algebraic Methods in Programming, vol.84, issue.6, pp.763-780, 2015. ,
DOI : 10.1016/j.jlamp.2015.09.003
URL : https://hal.archives-ouvertes.fr/hal-01213201
Alberto Lluch-Lafuente, and Andrea Vandin. A Conceptual Framework for Adaptation, FASE 2012, pp.240-254, 2012. ,
Towards Global and Local Types for Adaptation, SEFM 2013, pp.3-14, 2014. ,
DOI : 10.1007/978-3-319-05032-4_1
URL : https://hal.archives-ouvertes.fr/hal-01089358
Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies, 2012. [BM11] Nataliia Bielova and Fabio Massacci POLICY 2011, pp.89-96, 2011. ,
Secure Information Flow as a Safety Property Timed Multiparty Session Types, CONCUR 2014, pp.20-34, 2008. ,
Typing access control and secure information flow in sessions, Information and Computation, vol.238, pp.68-105, 2014. ,
DOI : 10.1016/j.ic.2014.07.005
URL : https://hal.archives-ouvertes.fr/hal-01088782
Information Flow Safety in Multiparty Sessions, Mathematical Structures in Computer Science, pp.1-43, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01237236
Self-adaptive multiparty sessions, Service Oriented Computing and Applications, vol.7, issue.3, pp.249-268, 2015. ,
DOI : 10.1007/s11761-014-0171-9
Global progress for dynamically interleaved multiparty sessions, CDP14] Ilaria Castellani, Mariangiola Dezani-Ciancaglini, and Jorge A. Pérez. Self-Adaptation and Secure Information Flow in Multiparty Structured Communications: A Unified Perspective BEAT 2014, pp.238-302, 2014. ,
DOI : 10.1007/978-3-642-40184-8_30
URL : https://hal.archives-ouvertes.fr/hal-01486034
Structured Communication-Centered Programming for Web Services, ACM Transactions on Programming Languages and Systems, vol.34, issue.2, pp.1-8, 2012. ,
DOI : 10.1145/2220365.2220367
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
AIOCJ: A Choreographic Framework for Safe Adaptive Distributed Applications, SLE 2014, pp.161-170, 2014. ,
Noninterference through Secure Multi-execution, 2010 IEEE Symposium on Security and Privacy, pp.109-124, 2010. ,
DOI : 10.1109/SP.2010.15
Disciplined Structured Communications with Consistent Runtime Adaptation, SAC 2013, 1913. ,
Disciplined Structured Communications with Disciplined Runtime Adaptation, Science of Computer Programming, vol.97, pp.235-265, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01052441
An Event-Based Approach to Runtime Adaptation in Communication-Centric Systems, Web Services, Formal Methods, and Behavioral Types, pp.67-85, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01093090
Automata-Based Confidentiality Monitoring, LNCS, vol.4, issue.1-2, pp.75-89, 2006. ,
DOI : 10.1007/11555827_21
BASS, Proceedings of the 8th ACM SIGPLAN symposium on Principles and practice of declarative programming , PPDP '06, pp.61-72191, 2005. ,
DOI : 10.1145/1140335.1140344
Foundations of Session Types and Behavioural Contracts, ACM Computing Surveys, vol.163, issue.491, pp.1-3, 2016. ,
Language primitives and type discipline for structured communication-based programming, LNCS, vol.1381, pp.22-138, 1998. ,
DOI : 10.1007/BFb0053567
Multiparty Asynchronous Session Types, POPL 2008, pp.273-284, 2008. ,
Multiparty Asynchronous Session Types, Journal of the ACM, vol.63, issue.19, 2016. ,
Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005. ,
DOI : 10.1007/s10207-004-0046-8
A Systematic Literature Review of Service Choreography Adaptation, Service Oriented Computing and Applications, pp.199-216, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00860873
Protecting Privacy using the Decentralized Label Model [Pad11] Luca Padovani. Session Types = Intersection Types + Union Types, ITRS 2010, pp.410-442, 2000. ,
Secure Enforcement for Global Process Specifications, CONCUR 2009, pp.511-526, 2009. ,
DOI : 10.1007/BFb0053567
Types and Programming Languages [PS03] François Pottier and Vincent Simonet Information Flow Inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2002. ,
Tracking Information Flow in Dynamic Tree Structures, ESORICS 2009, pp.86-103, 2009. ,
DOI : 10.1007/3-540-48294-6_20
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
Language-Based Information-Flow Security From Dynamic to Static and Back: Riding the Roller Coaster of Information-flow Control Research, PSI 2009ZM07] Lantian Zheng and Andrew C. Myers. Dynamic Security Labels and Static Information Flow Control, pp.5-19, 2003. ,