H. Thomas, C. Austin, and . Flanagan, Multiple Facets for Dynamic Information Flow, POPL 2012, pp.165-178, 2012.

A. Askarov and A. Sabelfeld, Tight Enforcement of Information-Release Policies for Dynamic Languages, 2009 22nd IEEE Computer Security Foundations Symposium, pp.43-59, 2009.
DOI : 10.1109/CSF.2009.22

M. Bugliesi, G. Castagna, and S. Crafa, Access control for mobile agents, ACM Transactions on Programming Languages and Systems, vol.26, issue.1, pp.57-124, 2004.
DOI : 10.1145/963778.963781

URL : https://hal.archives-ouvertes.fr/hal-00152525

V. Bono and S. Capecchi, Ilaria Castellani, and Mariangiola Dezani-Ciancaglini. A Reputation System for Multirole Sessions, TGC 2011, pp.1-24, 2012.

R. Bcd-+-09-]-karthikeyan-bhargavan, P. Corin, C. Deniélou, J. J. Fournet, and . Leifer, Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, CSF 2009, pp.124-140, 2009.

L. Bocchi, R. Tzu-chun-chen, K. Demangeon, N. Honda, and . Yoshida, Monitoring Networks through Multiparty Session Types, FMOODS/FORTE 2013, pp.50-65, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01213683

I. Bartoletti, P. Castellani, M. Deniélou, S. Dezani-ciancaglini, J. Ghilezan et al., Combining behavioural types with security analysis, Journal of Logical and Algebraic Methods in Programming, vol.84, issue.6, pp.763-780, 2015.
DOI : 10.1016/j.jlamp.2015.09.003

URL : https://hal.archives-ouvertes.fr/hal-01213201

R. Bruni, A. Corradini, and F. Gadducci, Alberto Lluch-Lafuente, and Andrea Vandin. A Conceptual Framework for Adaptation, FASE 2012, pp.240-254, 2012.

M. Bravetti, M. Carbone, T. T. Hildebrandt, I. Lanese, J. Mauro et al., Towards Global and Local Types for Adaptation, SEFM 2013, pp.3-14, 2014.
DOI : 10.1007/978-3-319-05032-4_1

URL : https://hal.archives-ouvertes.fr/hal-01089358

M. Bravetti, C. Di-giusto, J. A. Pérez, and G. Zavattaro, Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies, 2012. [BM11] Nataliia Bielova and Fabio Massacci POLICY 2011, pp.89-96, 2011.

G. Boudol, L. Bocchi, W. Yang, and N. Yoshida, Secure Information Flow as a Safety Property Timed Multiparty Session Types, CONCUR 2014, pp.20-34, 2008.

S. Capecchi, I. Castellani, and M. Dezani-ciancaglini, Typing access control and secure information flow in sessions, Information and Computation, vol.238, pp.68-105, 2014.
DOI : 10.1016/j.ic.2014.07.005

URL : https://hal.archives-ouvertes.fr/hal-01088782

S. Capecchi, I. Castellani, and M. Dezani-ciancaglini, Information Flow Safety in Multiparty Sessions, Mathematical Structures in Computer Science, pp.1-43, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01237236

M. Coppo, M. Dezani-ciancaglini, and B. Venneri, Self-adaptive multiparty sessions, Service Oriented Computing and Applications, vol.7, issue.3, pp.249-268, 2015.
DOI : 10.1007/s11761-014-0171-9

M. Coppo, M. Dezani-ciancaglini, N. Yoshida, and L. Padovani, Global progress for dynamically interleaved multiparty sessions, CDP14] Ilaria Castellani, Mariangiola Dezani-Ciancaglini, and Jorge A. Pérez. Self-Adaptation and Secure Information Flow in Multiparty Structured Communications: A Unified Perspective BEAT 2014, pp.238-302, 2014.
DOI : 10.1007/978-3-642-40184-8_30

URL : https://hal.archives-ouvertes.fr/hal-01486034

M. Carbone, K. Honda, and N. Yoshida, Structured Communication-Centered Programming for Web Services, ACM Transactions on Programming Languages and Systems, vol.34, issue.2, pp.1-8, 2012.
DOI : 10.1145/2220365.2220367

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

S. Dgl-+-14-]-mila-dalla-preda, I. Giallorenzo, J. Lanese, M. Mauro, and . Gabbrielli, AIOCJ: A Choreographic Framework for Safe Adaptive Distributed Applications, SLE 2014, pp.161-170, 2014.

D. Devriese and F. Piessens, Noninterference through Secure Multi-execution, 2010 IEEE Symposium on Security and Privacy, pp.109-124, 2010.
DOI : 10.1109/SP.2010.15

C. Di, G. , and J. A. Pérez, Disciplined Structured Communications with Consistent Runtime Adaptation, SAC 2013, 1913.

C. Di, G. , and J. A. Pérez, Disciplined Structured Communications with Disciplined Runtime Adaptation, Science of Computer Programming, vol.97, pp.235-265, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01052441

C. Di, G. , and J. A. Perez, An Event-Based Approach to Runtime Adaptation in Communication-Centric Systems, Web Services, Formal Methods, and Behavioral Types, pp.67-85, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01093090

A. Gurvan-le-guernic, T. P. Banerjee, D. A. Jensen, and . Schmidt, Automata-Based Confidentiality Monitoring, LNCS, vol.4, issue.1-2, pp.75-89, 2006.
DOI : 10.1007/11555827_21

P. Garralda, A. B. Compagnoni, and M. Dezani-ciancaglini, BASS, Proceedings of the 8th ACM SIGPLAN symposium on Principles and practice of declarative programming , PPDP '06, pp.61-72191, 2005.
DOI : 10.1145/1140335.1140344

H. Hüttel, I. Lanese, T. Vasco, L. Vasconcelos, M. Caires et al., Foundations of Session Types and Behavioural Contracts, ACM Computing Surveys, vol.163, issue.491, pp.1-3, 2016.

K. Honda, V. T. Vasconcelos, and M. Kubo, Language primitives and type discipline for structured communication-based programming, LNCS, vol.1381, pp.22-138, 1998.
DOI : 10.1007/BFb0053567

K. Honda, N. Yoshida, and M. Carbone, Multiparty Asynchronous Session Types, POPL 2008, pp.273-284, 2008.

K. Honda, N. Yoshida, and M. Carbone, Multiparty Asynchronous Session Types, Journal of the ACM, vol.63, issue.19, 2016.

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005.
DOI : 10.1007/s10207-004-0046-8

A. F. Leonardo, G. A. Leite, G. M. Oliva, M. A. Nogueira, F. Gerosa et al., A Systematic Literature Review of Service Choreography Adaptation, Service Oriented Computing and Applications, pp.199-216, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00860873

C. Andrew, B. Myers, and . Liskov, Protecting Privacy using the Decentralized Label Model [Pad11] Luca Padovani. Session Types = Intersection Types + Union Types, ITRS 2010, pp.410-442, 2000.

J. Planul, R. Corin, and C. Fournet, Secure Enforcement for Global Process Specifications, CONCUR 2009, pp.511-526, 2009.
DOI : 10.1007/BFb0053567

C. Benjamin and . Pierce, Types and Programming Languages [PS03] François Pottier and Vincent Simonet Information Flow Inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2002.

A. Russo, A. Sabelfeld, and A. Chudnov, Tracking Information Flow in Dynamic Tree Structures, ESORICS 2009, pp.86-103, 2009.
DOI : 10.1007/3-540-48294-6_20

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

A. Sabelfeld, A. C. Myers, A. Sabelfeld, and . Russo, Language-Based Information-Flow Security From Dynamic to Static and Back: Riding the Roller Coaster of Information-flow Control Research, PSI 2009ZM07] Lantian Zheng and Andrew C. Myers. Dynamic Security Labels and Static Information Flow Control, pp.5-19, 2003.