A Theory of Objects, 1996. ,
DOI : 10.1007/978-1-4419-8598-9
Hierarchical and Declarative Security for Grid Applications, International Conference On High Performance Computing, HIPC, 2003. ,
DOI : 10.1007/978-3-540-24596-4_39
Using access control for secure information flow in a Java-like language, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 2003. ,
DOI : 10.1109/CSFW.2003.1212711
Secure computer system: Unified exposition and multics interpretation, 1976. ,
Exception-based information flow control in object-oriented systems, ACM Transactions on Information and System Security, vol.1, issue.1, pp.26-65, 1998. ,
DOI : 10.1145/290163.290167
A Theory of Distributed Objects, 2005. ,
Asynchronous and deterministic objects, 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.123-134, 2004. ,
DOI : 10.1145/964001.964012
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.9095
Towards seamless computing and metacomputing in Java, Concurrency: Practice and Experience, vol.10, issue.11-13, pp.1043-1061, 1998. ,
DOI : 10.1002/(SICI)1096-9128(199809/11)10:11/13<1043::AID-CPE413>3.0.CO;2-6
Information flow security in mobile ambients, International Workshop on Concurrency and Coordination (ConCoord'01), 2001. ,
Information Flow Security for Boxed Ambients, Electronic Notes in Theoretical Computer Science, vol.66, issue.3, p.3, 2002. ,
DOI : 10.1016/S1571-0661(04)80417-1
Classification of Security Properties, Lecture Notes in Computer Science, vol.2171, pp.331-396, 2001. ,
DOI : 10.1007/3-540-45608-2_6
The security picalculus and non-interference, Journal of Logic and Algebraic Programming, 2003. ,
Information flow vs. resource access in the asynchronous pi-calculus, ACM Transactions on Programming Languages and Systems, vol.24, issue.5, p.3, 2000. ,
DOI : 10.1145/570886.570890
Information flow analysis of component-structured applications, Seventeenth Annual Computer Security Applications Conference, 2001. ,
DOI : 10.1109/ACSAC.2001.991520
Secure Information Flow as Typed Process Behaviour, Lecture Notes in Computer Science, p.1782, 2000. ,
DOI : 10.1007/3-540-46425-5_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.5509
A multilevel secure object-oriented data model, Information Security: An Integrated Collection of Essays, pp.596-616, 1995. ,
Communicating and Mobile Systems: the ?-Calculus, 1999. ,
A calculus of mobile processes, part I/II, pp.1-7789, 1992. ,
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999. ,
DOI : 10.1145/292540.292561
The Impact of Synchronisation on Secure Information Flow in Concurrent Programs, 4th International Conference on Perspectives of System Informatics, p.2244, 2001. ,
DOI : 10.1007/3-540-45575-2_22
Information flow control in object-oriented systems, IEEE Transactions on Knowledge and Data Engineering, vol.9, issue.4, pp.524-538, 1997. ,
DOI : 10.1109/69.617048
Access control: Policies, models, and mechanisms, in: Foundations of Security Analysis and Design : Tutorial Lectures, Lecture Notes in Computer Science, vol.2171, 2001. ,
Untrusted hosts and confidentiality: Secure program partitioning, pp.1-14, 2001. ,