Transforming out timing leaks, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, pp.40-53, 2000. ,
DOI : 10.1145/325694.325702
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.9484
Typing noninterference for reactive programs, The Journal of Logic and Algebraic Programming, vol.72, issue.2, pp.124-156, 2007. ,
DOI : 10.1016/j.jlap.2007.02.009
URL : https://hal.archives-ouvertes.fr/inria-00070413
Formally verifying information flow type systems for concurrent and thread systems, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, 2004. ,
DOI : 10.1145/1029133.1029136
URL : https://hal.archives-ouvertes.fr/inria-00000632
Noninterference for concurrent programs and thread systems, Theoretical Computer Science, vol.281, issue.1-2, pp.109-130, 2002. ,
DOI : 10.1016/S0304-3975(02)00010-5
URL : https://hal.archives-ouvertes.fr/inria-00072334
Verifying persistent security properties, Computer Languages, Systems & Structures, vol.30, issue.3-4, pp.3-4, 2004. ,
DOI : 10.1016/j.cl.2004.02.005
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3592
Information flow security in dynamic contexts, Proceedings of the 15th IEEE Computer Security Foundations Workshop, 2002. ,
DOI : 10.3233/JCS-2006-14103
Classification of Security Properties (Part I: Information Flow) In Foundations of Security Analysis and Design -Tutorial Lectures, LNCS, vol.2171, 2001. ,
Bridging Language-Based and Process Calculi Security, Proceedings of FoSSaCs'05, 2005. ,
DOI : 10.1007/978-3-540-31982-5_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.4114
A Theory of Noninterference for the ??-Calculus, Proceedings of Symp. on Trustworthy Global Computing TGC'05, 2005. ,
DOI : 10.1007/11580850_2
Information flow vs. resource access in the asynchronous pi-calculus, ACM Transactions on Programming Languages and Systems, vol.24, issue.5, pp.566-591, 2002. ,
DOI : 10.1145/570886.570890
The security pi-calculus and non-interference, The Journal of Logic and Algebraic Programming, vol.63, issue.1, pp.3-34, 2004. ,
DOI : 10.1016/j.jlap.2004.01.003
An efficiency preorder for processes, Acta Informatica, vol.1, issue.29, pp.737-760, 1992. ,
Secure information flow as typed process behavior, Proceedings of ESOP'00, pp.180-199, 2000. ,
DOI : 10.1007/3-540-46425-5_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.5509
A uniform type structure for secure information flow, ACM TOPLAS. Extended abstract in Proceedings of POPL'02, pp.81-92, 2002. ,
Linearity and bisimulation, Proceedings of FoSSaCs'02, pp.417-433, 2002. ,
DOI : 10.1016/j.jlap.2007.02.011
URL : http://doi.org/10.1016/j.jlap.2007.02.011
Linearity and the ?-calculus, Proceedings of POPL'96, pp.358-371, 1996. ,
Type-based information flow analysis for the ??-calculus, Acta Informatica, vol.15, issue.2/3, pp.291-347, 2005. ,
DOI : 10.1007/s00236-005-0179-x
Communication and Concurrency, 1989. ,
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999. ,
DOI : 10.1145/292540.292561
Jif: Java information flow. Software release, 2001. ,
A simple view of type-secure information flow in the ??-calculus, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.320-330, 2002. ,
DOI : 10.1109/CSFW.2002.1021826
Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003. ,
DOI : 10.1145/596980.596983
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.6266
The FlowCaml system: documentation and user manual. INRIA Tech, 2003. ,
A unifying approach to the security of distributed and multi-threaded programs1, Journal of Computer Security, vol.11, issue.4, pp.615-676, 2003. ,
DOI : 10.3233/JCS-2003-11406
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979
Probabilistic noninterference for multi-threaded programs, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.200-214, 2000. ,
DOI : 10.1109/CSFW.2000.856937
The ?-calculus: a Theory of Mobile Processes, 2001. ,
A new type system for secure information flow, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.115-125, 2001. ,
DOI : 10.1109/CSFW.2001.930141
Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.355-364, 1998. ,
DOI : 10.1145/268946.268975
Probabilistic noninterference in a concurrent language, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.231-253, 1999. ,
DOI : 10.1109/CSFW.1998.683153
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304
Secure information flow via linear continuations, Higher Order and Symbolic Computation, pp.209-234, 2002. ,
Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Rocquencourt, Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex ,
BP 105 -78153 Le Chesnay Cedex (France) ?tt??????????r????r ,