C. Aiswarya, P. Gastin, K. Narayan, and . Kumar, Verifying Communicating Multi-pushdown Systems via Split-Width, Proc. of ATVA 2014, pp.1-17, 2014.
DOI : 10.1007/978-3-319-11936-6_1

R. Alur and M. Yannakakis, Model Checking of Message Sequence Charts, Proc. of 10th Int. Conf. on Concurrency Theory, CONCUR '99, pp.114-129, 1999.
DOI : 10.1007/3-540-48320-9_10

P. Baldan and A. Carraro, Non-interference by Unfolding, 35th Int. Conf. on Application and Theory of Petri Nets and Concurrency, PETRI NETS, pp.190-209, 2014.
DOI : 10.1007/s002360000041

B. Bérard, L. Hélouët, and J. Mullins, Non-interference in Partial Order Models, Proc. of 15th Int. Conf. on Application of Concurrency to System Design, ACSD 2015, pp.80-89, 2015.

E. Best and P. Darondeau, Deciding Selective Declassification of Petri Nets, Proc. of 1st Int. Cong. on Principles of Security and Trust, POST 2012, pp.290-308, 2012.
DOI : 10.1007/978-3-642-28641-4_16

URL : https://hal.archives-ouvertes.fr/hal-00745298

E. Best, P. Darondeau, and R. Gorrieri, On the Decidability of Non Interference over Unbounded Petri Nets, Proc. of SecCo (EPTCS), pp.16-33, 2010.
DOI : 10.4204/EPTCS.51.2

URL : https://hal.archives-ouvertes.fr/inria-00591568

B. Bérard and J. Mullins, Verification of Information Flow Properties under Rational Observation, Proc. of AVOCS 2014, 2014.

N. Busi and R. Gorrieri, Structural non-interference in elementary and trace nets, Mathematical Structures in Computer Science, vol.1491, issue.06, pp.1065-1090, 2009.
DOI : 10.1016/j.entcs.2004.02.006

B. Caillaud, P. Darondeau, L. Hélouët, and G. Lesventes, HMSCs en tant que spécifications partielles et leurs complétions dans les réseaux de Petri, 2000.

D. D. 'souza, R. Holla, K. R. Raghavendra, and B. Sprick, Model-checking trace-based information flow properties*, Journal of Computer Security, vol.19, issue.1, pp.101-138, 2011.
DOI : 10.3233/JCS-2010-0400

R. Focardi and R. Gorrieri, Classification of Security Properties (Part I: Information Flow), Foundations of Security Analysis and Design, pp.331-396, 2001.

B. Genest, L. Hélouët, and A. Muscholl, High-Level Message Sequence Charts and Projections, Proc. of CON- CUR'03, pp.308-322, 2003.
DOI : 10.1007/978-3-540-45187-7_21

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

R. Gorrieri and M. Vernali, On Intransitive Non-interference in Some Models of Concurrency, FOSAD VI Tutorial Lectures, pp.125-151, 2011.
DOI : 10.1109/CSFW.1999.779775

H. Mantel, Possibilistic definitions of security-an assembly kit, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.185-199, 2000.
DOI : 10.1109/CSFW.2000.856936

F. Mattern, Time and global states of distributed systems, Proc. Int. Workshop on Parallel and Distributed Algorithms, pp.215-226, 1988.

A. Muscholl and D. Peled, Message Sequence Graphs and Decision Problems on Mazurkiewicz Traces, Proc. of 24th Int, pp.81-91, 1999.
DOI : 10.1007/3-540-48340-3_8

A. Muscholl and D. Peled, Analyzing Message Sequence Charts, Proc. of 2nd Workshop on SDL and MSC, pp.3-17, 2000.

A. Ray, B. Sengupta, and R. Cleaveland, Secure Requirements Elicitation Through Triggered Message Sequence Charts, Proc. of ICDCIT 2004, pp.273-282, 2004.
DOI : 10.1007/978-3-540-30555-2_32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.5767

J. Rushby, Noninterference, Transitivity, and Channel-control Security Policies, 1992.