D. Bell and L. Lapadula, Secure Computer Systems: Mathematical Foundations, MITRE, vol.1, 1973.

D. Bell and L. Lapadula, Computer Security Model: Unified Exposition and Multics Interpretation, 1976.

K. Biba, Integrity Considerations for Secure Computer Systems, MITRE, issue.1, 1977.

M. Bishop, What is computer security?, IEEE Security & Privacy Magazine, vol.1, issue.1, 2003.
DOI : 10.1109/MSECP.2003.1176998

C. Bryce, J. Banatre, and D. Lemetayer, An approach to information security in distributed systems, Proceedings of the Fifth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, pp.384-394, 1995.
DOI : 10.1109/FTDCS.1995.525008

I. Copi, Introduction to Logic, 1972.

T. Gamage, B. Mcmillin, and T. Roth, Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, pp.158-163, 2010.
DOI : 10.1109/COMPSACW.2010.36

J. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

J. Goguen and J. Meseguer, Unwinding and Inference Control, 1984 IEEE Symposium on Security and Privacy, pp.75-87, 1984.
DOI : 10.1109/SP.1984.10019

M. Harrison, W. Ruzzo, and J. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

G. Howser and B. Mcmillin, Modeling and reasoning about the security of drive-by-wire automobile systems, International Journal of Critical Infrastructure Protection, vol.5, issue.3-4, pp.127-134, 2012.
DOI : 10.1016/j.ijcip.2012.09.001

G. Howser and B. Mcmillin, A multiple security domain model of a driveby-wire system, Proceedings of the Thirty-Seventh IEEE Computer Software and Applications Conference, pp.369-374, 2013.

G. Howser and B. Mcmillin, A modal model of Stuxnet attacks on cyberphysical systems: A matter of trust, Proceedings of the Eighth International Conference on Software Security and Reliability, pp.225-234, 2014.

S. Kripke, A completeness theorem in modal logic, The Journal of Symbolic Logic, vol.XIV, issue.01, pp.1-14, 1959.
DOI : 10.2307/2964568

E. Lee, Cyber-physical systems ? Are computing foundations adequate? presented at the NSF Workshop on Cyber-Physical Systems: Research Motivation, 2006.

C. Liau, Belief, information acquisition, and trust in multi-agent systems???A modal logic formulation, Artificial Intelligence, vol.149, issue.1, pp.31-60, 2003.
DOI : 10.1016/S0004-3702(03)00063-8

S. Lipner, Non-discretionary controls for commercial applications, Proceedings of the IEEE Symposium on Security and Privacy, pp.2-10, 1982.
DOI : 10.1109/sp.1982.10022

S. Mccamant and M. Ernst, Quantitative information flow as network flow capacity, ACM SIGPLAN Notices, vol.43, issue.6, pp.193-205, 2008.
DOI : 10.1145/1379022.1375606

J. Mclean, Security models and information flow, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.180-187, 1990.
DOI : 10.1109/RISP.1990.63849

A. Myers and B. Liskov, Protecting privacy in a decentralized environment, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.266-277, 2000.
DOI : 10.1109/DISCEX.2000.825031

N. Nagatou and T. Watanabe, Run-time detection of covert channels, First International Conference on Availability, Reliability and Security (ARES'06), pp.577-584, 2006.
DOI : 10.1109/ARES.2006.114

C. O. Halloran, A calculus of information flow, Proceedings of the First European Symposium on Research in Computer Security, pp.147-159, 1990.

K. Poulsen, Hacker disables more than 100 cars remotely, Wired, 2010.

A. Sabelfeld and A. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979

D. Sutherland, A model of information, Proceedings of the Ninth National Computer Security Conference, pp.175-183, 1986.

J. Wittbold and D. Johnson, Information flow in nondeterministic systems, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.144-161, 1990.
DOI : 10.1109/RISP.1990.63846

C. Woodyard, Start, unlock or honk horn of your GM car from a cellphone, 2010.