M. Abadi and L. Cardelli, A Theory of Objects, 1996.
DOI : 10.1007/978-1-4419-8598-9

I. Attali, D. Caromel, and A. Contes, Hierarchical and Declarative Security for Grid Applications, International Conference On High Performance Computing, HIPC, 2003.
DOI : 10.1007/978-3-540-24596-4_39

A. Banerjee and D. A. Naumann, Using access control for secure information flow in a Java-like language, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 2003.
DOI : 10.1109/CSFW.2003.1212711

D. E. Bell and L. J. Lapadula, Secure computer system: Unified exposition and multics interpretation, 1976.

E. Bertino, S. D. Di-vimercati, E. Ferrari, and P. Samarati, Exception-based information flow control in object-oriented systems, ACM Transactions on Information and System Security, vol.1, issue.1, pp.26-65, 1998.
DOI : 10.1145/290163.290167

D. Caromel and L. Henrio, A Theory of Distributed Objects, 2005.

D. Caromel, L. Henrio, and B. Serpette, Asynchronous and deterministic objects, 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.123-134, 2004.
DOI : 10.1145/964001.964012

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.9095

D. Caromel, W. Klauser, and J. Vayssiere, Towards seamless computing and metacomputing in Java, Concurrency: Practice and Experience, vol.10, issue.11-13, pp.1043-1061, 1998.
DOI : 10.1002/(SICI)1096-9128(199809/11)10:11/13<1043::AID-CPE413>3.0.CO;2-6

A. Cortesi and R. Focardi, Information flow security in mobile ambients, International Workshop on Concurrency and Coordination (ConCoord'01), 2001.

S. Crafa, M. Bugliesi, and G. Castagna, Information Flow Security for Boxed Ambients, Electronic Notes in Theoretical Computer Science, vol.66, issue.3, p.3, 2002.
DOI : 10.1016/S1571-0661(04)80417-1

R. Focardi and R. Gorrieri, Classification of Security Properties, Lecture Notes in Computer Science, vol.2171, pp.331-396, 2001.
DOI : 10.1007/3-540-45608-2_6

M. Hennessy, The security picalculus and non-interference, Journal of Logic and Algebraic Programming, 2003.

M. Hennessy and J. Riely, Information flow vs. resource access in the asynchronous pi-calculus, ACM Transactions on Programming Languages and Systems, vol.24, issue.5, p.3, 2000.
DOI : 10.1145/570886.570890

P. Herrmann, Information flow analysis of component-structured applications, Seventeenth Annual Computer Security Applications Conference, 2001.
DOI : 10.1109/ACSAC.2001.991520

K. Honda, V. Vasconcelos, and N. Yoshida, Secure Information Flow as Typed Process Behaviour, Lecture Notes in Computer Science, p.1782, 2000.
DOI : 10.1007/3-540-46425-5_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.5509

S. Jajodia, B. Kogan, and R. S. Sandhu, A multilevel secure object-oriented data model, Information Security: An Integrated Collection of Essays, pp.596-616, 1995.

R. Milner, Communicating and Mobile Systems: the ?-Calculus, 1999.

R. Milner, J. Parrow, and D. Walker, A calculus of mobile processes, part I/II, pp.1-7789, 1992.

A. C. Myers, JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999.
DOI : 10.1145/292540.292561

A. Sabelfeld, The Impact of Synchronisation on Secure Information Flow in Concurrent Programs, 4th International Conference on Perspectives of System Informatics, p.2244, 2001.
DOI : 10.1007/3-540-45575-2_22

P. Samarati, E. Bertino, A. Ciampichetti, and S. Jajodia, Information flow control in object-oriented systems, IEEE Transactions on Knowledge and Data Engineering, vol.9, issue.4, pp.524-538, 1997.
DOI : 10.1109/69.617048

P. Samarati and S. D. Vimercati, Access control: Policies, models, and mechanisms, in: Foundations of Security Analysis and Design : Tutorial Lectures, Lecture Notes in Computer Science, vol.2171, 2001.

S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers, Untrusted hosts and confidentiality: Secure program partitioning, pp.1-14, 2001.