M. Abadi, Security Protocols and Specifications, FoSSaCS '99, pp.1-13, 1999.
DOI : 10.1007/3-540-49019-1_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Abadi, C. Fournet, and G. Gonthier, Secure Implementation of Channel Abstractions, Information and Computation, vol.174, issue.1, pp.37-83, 2002.
DOI : 10.1006/inco.2002.3086

URL : http://doi.org/10.1006/inco.2002.3086

M. Abadi and A. D. Gordon, A Calculus for Cryptographic Protocols: The Spi Calculus, Information and Computation, vol.148, issue.1, pp.1-70, 1999.
DOI : 10.1006/inco.1998.2740

C. Bodei, P. Degano, F. Nielson, and H. Nielson, Control flow analysis for the pi-calculus, CONCUR '98, pp.84-98, 1998.

C. Boyapati, R. Lee, and M. C. Rinard, Ownership types for safe programming: preventing data races and deadlocks, OOPSLA, pp.211-230, 2002.
DOI : 10.1145/582419.582440

C. Boyapati, B. Liskov, and L. Shrira, Ownership types for object encapsulation, POPL, pp.213-223, 2003.
DOI : 10.1145/640128.604156

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Boyapati, A. Salcianu, W. S. Beebee, and M. C. Rinard, Ownership types for safe region-based memory management in real-time java, PLDI, pp.324-337, 2003.

L. Cardelli, G. Ghelli, and A. D. Gordon, Secrecy and group creation, Information and Computation, vol.196, issue.2, pp.127-155, 2005.
DOI : 10.1016/j.ic.2004.08.003

URL : http://doi.org/10.1016/j.ic.2004.08.003

D. Clarke, Object Ownership and Containment, 2001.
DOI : 10.1007/3-540-45337-7_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Clarke and S. Drossopoulou, Ownership, encapsulation and the disjointness of type and effect, OOPSLA, pp.292-310, 2002.

D. Clarke, J. Potter, and J. Noble, Ownership types for flexible alias protection, OOPSLA, pp.48-64, 1998.
DOI : 10.1145/286942.286947

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Clarke, M. Richmond, and J. Noble, Saving the world from bad beans: deployment-time confinement checking, OOPSLA '03, pp.374-387, 2003.
DOI : 10.1145/949305.949339

D. Dolev and A. C. Yao, On the security of public key protocols, SFCS, pp.350-357, 1981.

C. Fournet and G. Gonthier, The reflexive CHAM and the join-calculus, Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '96, pp.372-385, 1996.
DOI : 10.1145/237721.237805

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Fournet and G. Gonthier, The Join Calculus: A Language for Distributed Mobile Programming, APPSEM, pp.268-332, 2000.
DOI : 10.1007/3-540-45699-6_6

C. Fournet, C. Laneve, L. Maranget, and D. Rémy, Implicit typingà typing`typingà la ML for the Join-calculus, In CONCUR, pp.196-212, 1997.
DOI : 10.1007/3-540-63141-0_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. Haller and T. Van-cutsem, Implementing Joins Using Extensible Pattern Matching, COORDINATION'08, pp.135-152
DOI : 10.1007/978-3-540-68265-3_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Neelakantan, J. Krishnaswami, and . Aldrich, Permission-based ownership: encapsulating state in higher-order typed languages, PLDI, pp.96-106, 2005.

M. Patrignani, D. Clarke, and D. Sangiorgi, Ownership Types for the Join Calculus, CW Reports CW603, 2011.
DOI : 10.1006/inco.1994.1093

URL : https://hal.archives-ouvertes.fr/hal-01583320

B. Pierce, Types and Programming Languages, 2002.

H. Plociniczak and S. Eisenbach, JErlang: Erlang with Joins, In COOR- DINATION LNCS, vol.6116, pp.61-75, 2010.
DOI : 10.1007/978-3-642-13414-2_5

URL : https://hal.archives-ouvertes.fr/hal-01054623

J. Vitek and B. Bokowski, Confined types, OOPSLA '99, pp.82-96, 1999.
DOI : 10.1145/320384.320392

K. Andrew, M. Wright, and . Felleisen, A syntactic approach to type soundness, Inf. Comput, vol.115, pp.38-94, 1994.