M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proc. 28th ACM Symposium on Principles of Programming Languages (POPL'01), 2001.
DOI : 10.1145/373243.360213

URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Arapinis, J. Liu, E. Ritter, and M. Ryan, Stateful Applied Pi Calculus, 2014.
DOI : 10.1007/978-3-642-54792-8_2

A. Askarov, D. Hedin, and A. Sabelfeld, Cryptographically-masked flows, Theor. Comput. Sci, vol.402, issue.2-3, 2008.
DOI : 10.1016/j.tcs.2008.04.028

URL : http://doi.org/10.1016/j.tcs.2008.04.028

J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, and S. Maffeis, Refinement types for secure implementations, ACM Trans. Program. Lang. Syst, vol.33, issue.2, 2011.
DOI : 10.1145/1890028.1890031

URL : https://hal.archives-ouvertes.fr/hal-01294973

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930138

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

T. Chothia and D. Duggan, Type-Based Distributed Access Control vs. Untyped Attackers, Formal Aspects in Security and Trust, Third International Workshop, FAST, 2005.
DOI : 10.1007/11679219_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

T. Chothia, D. Duggan, and J. Vitek, Type-based distributed access control, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 2003.
DOI : 10.1109/CSFW.2003.1212712

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

E. Dorothy, P. J. Denning, and . Denning, Certification of programs for secure information flow, Commun. ACM, vol.20, issue.7, 1977.

C. Fournet, A. Gordon, and S. Maffeis, A Type Discipline for Authorization in Distributed Systems, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007.
DOI : 10.1109/CSF.2007.7

C. Fournet and T. Rezk, Cryptographically sound implementations for typed information-flow security, Proceedings of the 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '08, 2008.
DOI : 10.1145/1328438.1328478

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

L. Jia, J. A. Vaughan, K. Mazurak, J. Zhao, L. Zarko et al., AURA: a programming language for authorization and audit, 13th ACM SIGPLAN International Conference on Functional Programming, ICFP, 2008.

J. Liu, M. D. George, K. Vikram, X. Qi, L. Waye et al., Fabric, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, p.9, 2009.
DOI : 10.1145/1629575.1629606

J. Liu and A. C. Myers, Defining and Enforcing Referential Security, Principles of Security and Trust: Third International Conference, 2014.
DOI : 10.1007/978-3-642-54792-8_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Morgenstern and D. R. Licata, Security-typed programming within dependently typed programming, 15th ACM SIGPLAN International Conference on Functional Programming, 2010.
DOI : 10.1145/1863543.1863569

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Muller and S. Chong, Towards a practical secure concurrent language, Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming Languages, Systems, Languages, and Applications, 2012.
DOI : 10.1145/2398857.2384621

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Andrew, B. Myers, and . Liskov, Protecting privacy using the decentralized label model, ACM Trans. Softw. Eng. Methodol, vol.9, issue.4, 2000.

A. Sabelfeld and D. Sands, Probabilistic noninterference for multi-threaded programs, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 2000.
DOI : 10.1109/CSFW.2000.856937

J. A. Vaughan, L. Jia, K. Mazurak, and S. Zdancewic, Evidence-Based Audit, 2008 21st IEEE Computer Security Foundations Symposium, 2008.
DOI : 10.1109/CSF.2008.24

A. Jeffrey, S. Vaughan, and . Zdancewic, A cryptographic decentralized label model, IEEE Symposium on Security and Privacy, 2007.

N. Zeldovich, S. Boyd-wickizer, and D. Eres, Securing distributed systems with information flow control, Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08. USENIX Association, 2008.

L. Zheng and A. C. Myers, Dynamic Security Labels and Noninterference (Extended Abstract), IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2005.
DOI : 10.1007/0-387-24098-5_3