B. Alpern and F. Schneider, Recognizing safety and liveness, Distributed Computing, vol.56, issue.1???2, pp.181-126, 1987.
DOI : 10.1007/BF01782772

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.5470

M. Y. Becker, Information flow in trust management systems, Journal of Computer Security, vol.20, issue.6, pp.677-708, 2012.
DOI : 10.3233/JCS-2012-0443

URL : http://doi.org/10.3233/jcs-2012-0443

M. Y. Becker, C. Fournet, and A. D. Gordon, SecPAL: Design and semantics of a decentralized authorization language, Journal of Computer Security, vol.18, issue.4, pp.619-665, 2010.
DOI : 10.3233/JCS-2009-0364

M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The KeyNote Trust-Management System Version 2, RFCInformational), vol.2704, 1999.
DOI : 10.17487/rfc2704

M. Blaze, J. Feigenbaum, and M. Strauss, Compliance checking in the PolicyMaker trust management system, FC '98: Proceedings of the Second International Conference on Financial Cryptography, pp.254-274, 1998.
DOI : 10.1007/BFb0055488

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas et al., SPKI Certificate Theory, RFCExperimental), vol.2693, 1999.
DOI : 10.17487/rfc2693

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.189.1209

K. Engelhardt, R. Van-der-meyden, and C. Zhang, Intransitive noninterference in nondeterministic systems, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.869-880, 2012.
DOI : 10.1145/2382196.2382288

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.303.6822

K. Feeney, D. Lewis, and D. Sullivan, Service-Oriented Policy Management for Web-Application Frameworks, IEEE Internet Computing, vol.13, issue.6, pp.39-47, 2009.
DOI : 10.1109/MIC.2009.95

URL : http://www.tara.tcd.ie/bitstream/2262/67056/1/internet-computing-revision-2-final.pdf

S. N. Foley and H. Zhou, Authorisation subterfuge by delegation in decentralised networks, International Security Protocols Workshop, 2005.

S. Foley, A non-functional approach to system integrity, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, 2003.

S. Foley and S. Abdi, Avoiding Delegation Subterfuge Using Linked Local Permission Names, Proceedings of 8th International Workshop on Formal Aspects of Security and Trust (FAST2011), 2011.
DOI : 10.1007/978-3-642-29420-4_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.7791

J. Goguen and J. Meseguer, Unwinding and Inference Control, 1984 IEEE Symposium on Security and Privacy, pp.75-87, 1984.
DOI : 10.1109/SP.1984.10019

Y. Gurevich and I. Neeman, DKAL: Distributed-Knowledge Authorization Language, 2008 21st IEEE Computer Security Foundations Symposium, p.CSF, 2008.
DOI : 10.1109/CSF.2008.8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.7900

J. Jacob, Basic Theorems about Security, Journal of Computer Security, vol.1, issue.3-4, pp.385-411, 1992.
DOI : 10.3233/JCS-1992-13-409

URL : http://doi.org/10.3233/jcs-1992-13-409

B. Lampson, M. Abadi, M. Burrows, and E. Wobber, Authentication in distributed systems: theory and practice, ACM Transactions on Computer Systems, vol.10, issue.4, pp.265-310, 1992.
DOI : 10.1145/138873.138874

N. Li and J. C. Mitchell, RT: A role-based trust-management framework In: The Third DARPA Information Survivability Conference and Exposition (DISCEX III), pp.201-212, 2003.

H. Mantel, Information flow and noninterference In: Encyclopedia of Cryptography and Security, pp.605-607, 2011.

A. W. Roscoe and M. H. Goldsmith, What is intransitive noninterference?, Proceedings of the 12th IEEE Computer Security Foundations Workshop, pp.228-238, 1999.
DOI : 10.1109/CSFW.1999.779776

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.425

P. Ryan, R. Focardi, and R. Gorrieri, Mathematical Models of Computer Security, Lecture Notes in Computer Science, vol.2171, pp.1-62, 2001.
DOI : 10.1007/3-540-45608-2_1

T. Zeller, Purloined domain name is an unsolved mystery, 2005.

H. Zhou and S. N. Foley, A Logic for Analysing Subterfuge in Delegation Chains, Workshop on Formal Aspects in Security and Trust (FAST2005), 2005.
DOI : 10.1007/11679219_10

H. Zhou and S. Foley, A framework for establishing decentralized secure coalitions, Proceedings of IEEE Computer Security Foundations Workshop, 2006.