Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
Classification of security properties (Part I: Information flow) In: Proceedings of FOSAD'00, pp.331-396, 2001. ,
Process algebra and non-interference, Journal of Computer Security, vol.9, issue.1-2, pp.75-103, 2001. ,
DOI : 10.3233/JCS-2001-91-204
URL : http://www.cs.cornell.edu/people/vickyw/iflow/./papers/rya99.pdf
Possibilistic definitions of security-an assembly kit, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.185-199, 2000. ,
DOI : 10.1109/CSFW.2000.856936
URL : http://www.cs.cornell.edu/people/vickyw/iflow/papers/man00.pdf
Structural non-interference in elementary and trace nets, Mathematical Structures in Computer Science, vol.1491, issue.06, pp.1065-1090, 2009. ,
DOI : 10.1007/3-540-65306-6_14
On the Decidability of Non Interference over Unbounded Petri Nets, Proceedings of SecCo'10, pp.16-33, 2010. ,
DOI : 10.4204/EPTCS.51.2
URL : https://hal.archives-ouvertes.fr/inria-00591568
A Causal View on Non-Interference*, Fundamenta Informaticae, vol.140, issue.1, pp.1-38, 2015. ,
DOI : 10.3233/FI-2015-1243
Noninterference and the composability of security properties, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.178-186, 1988. ,
DOI : 10.1109/SECPRI.1988.8110
Information flow in nondeterministic systems, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.148-161, 1990. ,
DOI : 10.1109/RISP.1990.63846
Petri nets, event structures and domains, part I, Theoretical Computer Science, vol.13, issue.1, pp.85-108, 1981. ,
DOI : 10.1016/0304-3975(81)90112-2
URL : https://doi.org/10.1016/0304-3975(81)90112-2
Intransitive Non-Interference by Unfolding, Proceedings of FACS'14, pp.269-287, 2014. ,
DOI : 10.1007/978-3-319-15317-9_17
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Design and verification of secure systems, Proceedings of SOSP'81, pp.12-21, 1981. ,
DOI : 10.1145/800216.806586
MultiUBIC. https://github.com/AlessandroBeggiato/ MultiUbic/releases 15 Service Technology: ANICA: Automated Non-Interference Check Assistant ,
On Intransitive Non-interference in Some Models of Concurrency, Proceedings of FOSAD'11, pp.125-151, 2011. ,
DOI : 10.1109/CSFW.1999.779775
Unfoldings -A Partial order Approach to Model Checking . EACTS Monographs in Theoretical Computer Science, 2008. ,
A technique of state space search based on unfolding, Formal Methods in System Design, vol.22, issue.12, pp.45-65, 1995. ,
DOI : 10.1007/BF01384314
Noninterference, transitivity, and channel-control security policies, 1992. ,
Canonical prefixes of Petri net unfoldings, Acta Informatica, vol.40, issue.2, pp.95-118, 2003. ,
DOI : 10.1007/s00236-003-0122-y
URL : http://homepages.cs.ncl.ac.uk/victor.khomenko/home.formal/papers/CS-TR-741.ps.gz
Petri net security checker: Structural noninterference at work, Proceedings of FAST'08, pp.210-225, 2008. ,
DOI : 10.1007/978-3-642-01465-9_14
URL : http://www.cs.unibo.it/~gorrieri/Papers/fast08.pdf
Automatic Information Flow Analysis of Business Process Models, Proceedings of BPM'12, pp.172-187, 2012. ,
DOI : 10.1007/978-3-642-32885-5_13
URL : http://www.informatik.uni-freiburg.de/~accorsi/papers/bpm12.pdf
Types of Asynchronous Diagnosability and the Reveals-Relation in Occurrence Nets, IEEE Transactions on Automatic Control, vol.55, issue.10, pp.2310-2320, 2010. ,
DOI : 10.1109/TAC.2010.2063490
URL : https://hal.archives-ouvertes.fr/inria-00379540
On the Verification of Intransitive Noninterference in Mulitlevel Security, IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics), vol.35, issue.5, pp.948-958, 2005. ,
DOI : 10.1109/TSMCB.2005.847749
Modelling Dynamic Opacity Using Petri Nets with Silent Actions, Proceedings of FAST'05, pp.159-172, 2005. ,
DOI : 10.1007/0-387-24098-5_12
Deciding Selective Declassification of Petri Nets, LNCS, vol.7215, pp.290-308, 2012. ,
DOI : 10.1007/978-3-642-28641-4_16
URL : https://hal.archives-ouvertes.fr/hal-00745298
Controlled Declassification Based on Intransitive Noninterference, pp.129-145, 2004. ,
DOI : 10.1109/CSFW.2001.930133
Equivalence notions for concurrent systems and refinement of actions, Acta Informatica, vol.37, issue.45, pp.229-327, 2001. ,
DOI : 10.1007/3-540-51486-4_71
Causality, Behavioural Equivalences, and the Security of Cyberphysical Systems, Correct System Design, pp.83-98, 2015. ,
DOI : 10.1007/3-540-54233-7_158