J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information flow) In: Proceedings of FOSAD'00, pp.331-396, 2001.

P. Ryan and Y. Schneider, Process algebra and non-interference, Journal of Computer Security, vol.9, issue.1-2, pp.75-103, 2001.
DOI : 10.3233/JCS-2001-91-204

URL : http://www.cs.cornell.edu/people/vickyw/iflow/./papers/rya99.pdf

H. Mantel, Possibilistic definitions of security-an assembly kit, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.185-199, 2000.
DOI : 10.1109/CSFW.2000.856936

URL : http://www.cs.cornell.edu/people/vickyw/iflow/papers/man00.pdf

N. Busi and R. Gorrieri, Structural non-interference in elementary and trace nets, Mathematical Structures in Computer Science, vol.1491, issue.06, pp.1065-1090, 2009.
DOI : 10.1007/3-540-65306-6_14

E. Best, P. Darondeau, and R. Gorrieri, On the Decidability of Non Interference over Unbounded Petri Nets, Proceedings of SecCo'10, pp.16-33, 2010.
DOI : 10.4204/EPTCS.51.2

URL : https://hal.archives-ouvertes.fr/inria-00591568

P. Baldan and A. Carraro, A Causal View on Non-Interference*, Fundamenta Informaticae, vol.140, issue.1, pp.1-38, 2015.
DOI : 10.3233/FI-2015-1243

D. Mccullough, Noninterference and the composability of security properties, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.178-186, 1988.
DOI : 10.1109/SECPRI.1988.8110

J. Wittbold and D. Johnson, Information flow in nondeterministic systems, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.148-161, 1990.
DOI : 10.1109/RISP.1990.63846

M. Nielsen, G. Plotkin, and G. Winskel, Petri nets, event structures and domains, part I, Theoretical Computer Science, vol.13, issue.1, pp.85-108, 1981.
DOI : 10.1016/0304-3975(81)90112-2

URL : https://doi.org/10.1016/0304-3975(81)90112-2

P. Baldan, F. Burato, and A. Carraro, Intransitive Non-Interference by Unfolding, Proceedings of FACS'14, pp.269-287, 2014.
DOI : 10.1007/978-3-319-15317-9_17

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

J. M. Rushby, Design and verification of secure systems, Proceedings of SOSP'81, pp.12-21, 1981.
DOI : 10.1145/800216.806586

A. Beggiato, MultiUBIC. https://github.com/AlessandroBeggiato/ MultiUbic/releases 15 Service Technology: ANICA: Automated Non-Interference Check Assistant

R. Gorrieri and M. Vernali, On Intransitive Non-interference in Some Models of Concurrency, Proceedings of FOSAD'11, pp.125-151, 2011.
DOI : 10.1109/CSFW.1999.779775

J. Esparza and K. Heljanko, Unfoldings -A Partial order Approach to Model Checking . EACTS Monographs in Theoretical Computer Science, 2008.

K. L. Mcmillan, A technique of state space search based on unfolding, Formal Methods in System Design, vol.22, issue.12, pp.45-65, 1995.
DOI : 10.1007/BF01384314

J. Rushby, Noninterference, transitivity, and channel-control security policies, 1992.

V. Khomenko, M. Koutny, and W. Vogler, Canonical prefixes of Petri net unfoldings, Acta Informatica, vol.40, issue.2, pp.95-118, 2003.
DOI : 10.1007/s00236-003-0122-y

URL : http://homepages.cs.ncl.ac.uk/victor.khomenko/home.formal/papers/CS-TR-741.ps.gz

S. Frau, R. Gorrieri, and C. Ferigato, Petri net security checker: Structural noninterference at work, Proceedings of FAST'08, pp.210-225, 2008.
DOI : 10.1007/978-3-642-01465-9_14

URL : http://www.cs.unibo.it/~gorrieri/Papers/fast08.pdf

R. Accorsi and A. Lehmann, Automatic Information Flow Analysis of Business Process Models, Proceedings of BPM'12, pp.172-187, 2012.
DOI : 10.1007/978-3-642-32885-5_13

URL : http://www.informatik.uni-freiburg.de/~accorsi/papers/bpm12.pdf

S. Haar, Types of Asynchronous Diagnosability and the Reveals-Relation in Occurrence Nets, IEEE Transactions on Automatic Control, vol.55, issue.10, pp.2310-2320, 2010.
DOI : 10.1109/TAC.2010.2063490

URL : https://hal.archives-ouvertes.fr/inria-00379540

B. N. Hadj-alouane, S. Lafrance, F. Lin, J. Mullins, and M. M. Yeddes, On the Verification of Intransitive Noninterference in Mulitlevel Security, IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics), vol.35, issue.5, pp.948-958, 2005.
DOI : 10.1109/TSMCB.2005.847749

J. Bryans, M. Koutny, and P. Ryan, Modelling Dynamic Opacity Using Petri Nets with Silent Actions, Proceedings of FAST'05, pp.159-172, 2005.
DOI : 10.1007/0-387-24098-5_12

E. Best and P. Darondeau, Deciding Selective Declassification of Petri Nets, LNCS, vol.7215, pp.290-308, 2012.
DOI : 10.1007/978-3-642-28641-4_16

URL : https://hal.archives-ouvertes.fr/hal-00745298

H. Mantel and D. Sands, Controlled Declassification Based on Intransitive Noninterference, pp.129-145, 2004.
DOI : 10.1109/CSFW.2001.930133

R. Van-glabbeek and U. Goltz, Equivalence notions for concurrent systems and refinement of actions, Acta Informatica, vol.37, issue.45, pp.229-327, 2001.
DOI : 10.1007/3-540-51486-4_71

S. Fröschle, Causality, Behavioural Equivalences, and the Security of Cyberphysical Systems, Correct System Design, pp.83-98, 2015.
DOI : 10.1007/3-540-54233-7_158