A core calculus of dependency, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.147-160, 1999. ,
DOI : 10.1145/292540.292555
Typing secure information flow: declassification and mobility, 2006. ,
URL : https://hal.archives-ouvertes.fr/pastel-00001765
A logic for information flow in objectoriented programs, Proceedings of POPL'06, pp.91-102, 2006. ,
A semantic model of types and machine instuctions for proofcarrying code, Proceedings POPL'00, pp.243-253, 2000. ,
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study, Proceedings of ESORICS'05, pp.197-221, 2005. ,
DOI : 10.1007/11555827_12
Mechanized Metatheory for the Masses: The PoplMark Challenge, Proceedings of TPHOLs'05, pp.50-65, 2005. ,
DOI : 10.1007/11541868_4
Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005. ,
DOI : 10.1017/S0956796804005453
Security types preserving compilation, Proceedings of VMCAI'04, pp.2-15, 2004. ,
DOI : 10.1016/j.cl.2005.05.002
Security types preserving compilation, Computer Languages, Systems & Structures, vol.33, issue.2, 2007. ,
DOI : 10.1016/j.cl.2005.05.002
Secure Information Flow by Self-Composition, Proceedings of CSFW'04, R. Foccardi, pp.100-114, 2004. ,
Deriving an information flow checker and certifying compiler for Java, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006. ,
DOI : 10.1109/SP.2006.13
A Certified Lightweight Non-interference Java Bytecode Verifier, European Symposium on Programming, ESOP'07, pp.125-140, 2007. ,
DOI : 10.1007/978-3-540-71316-6_10
URL : https://hal.archives-ouvertes.fr/inria-00106182
Non-interference for a JVM-like language, Proceedings of the 2005 ACM SIGPLAN international workshop on Types in languages design and implementation , TLDI '05, pp.103-112, 2005. ,
DOI : 10.1145/1040294.1040304
Security of multithreaded programs by compilation, ACM Transactions on Information and System Security, vol.13, issue.3, 2007. ,
DOI : 10.1145/1805974.1805977
Partial Evaluation and Non-interference for Object Calculi, Proceedings of FLOPS'99, pp.53-67, 1999. ,
DOI : 10.1007/10705424_4
Secure information flow and program logics, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007. ,
DOI : 10.1109/CSF.2007.30
Combining Abstract Interpretation and Model Checking for Analysing Security Properties of Java Bytecode, Proceedings of VMCAI'02, pp.1-15, 2002. ,
DOI : 10.1007/3-540-47813-2_1
Proof-Carrying Code from Certified Abstract Interpretation and Fixpoint Compression. Theoretical Computer Science, 2006. ,
Checking Secure Interactions of Smart Card Applets, Journal of Computer Security, vol.10, pp.369-398, 2002. ,
DOI : 10.1007/10722599_1
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks, Proceedings of CASSIS'05, pp.37-56, 2005. ,
DOI : 10.1007/BFb0030629
Noninterference for concurrent programs and thread systems, Theoretical Computer Science, vol.281, issue.1-2, pp.109-130, 2002. ,
DOI : 10.1016/S0304-3975(02)00010-5
URL : https://hal.archives-ouvertes.fr/inria-00072334
A Theorem Proving Approach to Analysis of Secure Information Flow, Proceedings International Conference on Security in Pervasive Computing Preliminary version in the informal proceedings of WITS'03, pp.193-209, 2005. ,
DOI : 10.1007/978-3-540-32004-3_20
Privacy-Sensitive Information Flow with JML, Proceedings of CADE'05, pp.116-130, 2005. ,
DOI : 10.1007/11532231_9
A Type System for the Java Bytecode Language and Verifier, Journal of Automated Reasoning, vol.30, pp.3-4, 2003. ,
Information Flow Analysis for Java Bytecode, Proceedings of VMCAI'05, R. Cousot, pp.346-362, 2005. ,
DOI : 10.1007/978-3-540-30579-8_23
Which security policy for multiapplication smart cards, Proceedings of Smartcard'99. USENIX Association, 1999. ,
Information flow control for java based on path conditions in dependence graphs, Proceedings of ISSSE'06, pp.87-96, 2006. ,
Noninterference in the Presence of Non-Opaque Pointers, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.255-269, 2006. ,
DOI : 10.1109/CSFW.2006.19
The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.365-377, 1998. ,
DOI : 10.1145/268946.268976
A Uniform Type Structure for Secure Information Flow, Proceedings of POPL'02, pp.81-92, 2002. ,
Type-Based Information Analysis for Low-Level Languages, Proceedings of APLAS'02, pp.302-316, 2002. ,
Bytecode verification on Java smart cards. Software?practice and experience 32, pp.319-340, 2002. ,
URL : https://hal.archives-ouvertes.fr/hal-01499944
A unifying approach to the security of distributed and multi-threaded programs1, Journal of Computer Security, vol.11, issue.4, pp.615-676, 2003. ,
DOI : 10.3233/JCS-2003-11406
The KRAKATOA tool for certificationof JAVA/JAVACARD programs annotated in JML, The Journal of Logic and Algebraic Programming, vol.58, issue.1-2, pp.89-106, 2004. ,
DOI : 10.1016/j.jlap.2003.07.006
A Typed Assembly Language for Non-interference, Proceedings of ICTCS 2005, pp.360-374, 2005. ,
DOI : 10.1007/11560586_29
Secure Object Sharing in Java Card, Proceedings of Usenix workshop on Smart Card Technology, 1999. ,
From system F to typed assembly language, ACM Transactions on Programming Languages and Systems, vol.21, issue.3, pp.527-568, 1999. ,
DOI : 10.1145/319301.319345
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999. ,
DOI : 10.1145/292540.292561
Verifying a Secure Information Flow Analyzer, Proceedings of TPHOLs'05, pp.211-226, 2003. ,
DOI : 10.1007/11541868_14
From coupling relations to mated invariants for checking information flow (extended abstract), Proceedings of ESORICS'06, 2006. ,
Principles of Program Analysis, 1999. ,
DOI : 10.1007/978-3-662-03811-6
Information-flow security for interactive programs, Proceedings of CSFW'06, pp.190-201, 2006. ,
Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003. ,
DOI : 10.1145/596980.596983
Verification of confidentiality policies for mobile code, 2006. ,
Securing Interaction between Threads and the Scheduler, 19th IEEE Computer Security Foundations Workshop (CSFW'06), 2006. ,
DOI : 10.1109/CSFW.2006.29
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
Dimensions and principles of declassification, Proceedings of CSFW'05, 2005. ,
Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.355-364, 1998. ,
DOI : 10.1145/268946.268975
Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language, Proceedings of SAS'04, pp.84-99, 2004. ,
DOI : 10.1007/978-3-540-27864-1_9
Secure Information Flow as a Safety Problem, Proceedings of SAS'05, pp.352-367, 2005. ,
DOI : 10.1007/11547662_24
A type-based approach to program security, Proceedings of TAPSOFT'97, pp.607-621, 1997. ,
DOI : 10.1007/BFb0030629
A Typed Assembly Language for Confidentiality, Proceedings of ESOP'06, P. Sestoft, pp.162-179, 2006. ,
DOI : 10.1023/A:1020843229247
Secure information flow via linear continuations, Higher- Order and Symbolic Computation, pp.2-3, 2002. ,