Verifying Communicating Multi-pushdown Systems via Split-Width, Proc. of ATVA 2014, pp.1-17, 2014. ,
DOI : 10.1007/978-3-319-11936-6_1
Model Checking of Message Sequence Charts, Proc. of 10th Int. Conf. on Concurrency Theory, CONCUR '99, pp.114-129, 1999. ,
DOI : 10.1007/3-540-48320-9_10
Non-interference by Unfolding, 35th Int. Conf. on Application and Theory of Petri Nets and Concurrency, PETRI NETS, pp.190-209, 2014. ,
DOI : 10.1007/s002360000041
Non-interference in Partial Order Models, Proc. of 15th Int. Conf. on Application of Concurrency to System Design, ACSD 2015, pp.80-89, 2015. ,
Deciding Selective Declassification of Petri Nets, Proc. of 1st Int. Cong. on Principles of Security and Trust, POST 2012, pp.290-308, 2012. ,
DOI : 10.1007/978-3-642-28641-4_16
URL : https://hal.archives-ouvertes.fr/hal-00745298
On the Decidability of Non Interference over Unbounded Petri Nets, Proc. of SecCo (EPTCS), pp.16-33, 2010. ,
DOI : 10.4204/EPTCS.51.2
URL : https://hal.archives-ouvertes.fr/inria-00591568
Verification of Information Flow Properties under Rational Observation, Proc. of AVOCS 2014, 2014. ,
Structural non-interference in elementary and trace nets, Mathematical Structures in Computer Science, vol.1491, issue.06, pp.1065-1090, 2009. ,
DOI : 10.1016/j.entcs.2004.02.006
HMSCs en tant que spécifications partielles et leurs complétions dans les réseaux de Petri, 2000. ,
Model-checking trace-based information flow properties*, Journal of Computer Security, vol.19, issue.1, pp.101-138, 2011. ,
DOI : 10.3233/JCS-2010-0400
Classification of Security Properties (Part I: Information Flow), Foundations of Security Analysis and Design, pp.331-396, 2001. ,
High-Level Message Sequence Charts and Projections, Proc. of CON- CUR'03, pp.308-322, 2003. ,
DOI : 10.1007/978-3-540-45187-7_21
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
On Intransitive Non-interference in Some Models of Concurrency, FOSAD VI Tutorial Lectures, pp.125-151, 2011. ,
DOI : 10.1109/CSFW.1999.779775
Possibilistic definitions of security-an assembly kit, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.185-199, 2000. ,
DOI : 10.1109/CSFW.2000.856936
Time and global states of distributed systems, Proc. Int. Workshop on Parallel and Distributed Algorithms, pp.215-226, 1988. ,
Message Sequence Graphs and Decision Problems on Mazurkiewicz Traces, Proc. of 24th Int, pp.81-91, 1999. ,
DOI : 10.1007/3-540-48340-3_8
Analyzing Message Sequence Charts, Proc. of 2nd Workshop on SDL and MSC, pp.3-17, 2000. ,
Secure Requirements Elicitation Through Triggered Message Sequence Charts, Proc. of ICDCIT 2004, pp.273-282, 2004. ,
DOI : 10.1007/978-3-540-30555-2_32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.5767
Noninterference, Transitivity, and Channel-control Security Policies, 1992. ,