B. Blanchet, A. M. , and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.331-340, 2005.
DOI : 10.1109/LICS.2005.8

G. Lowe, Towards a completeness result for model checking of security protocols, Journal of Computer Security, vol.7, issue.2-3, 1999.

V. Darmaillacq, J. Fernandez, R. Groz, L. Mounier, and J. Richier, Test Generation for Network Security Rules, TestCom 2006, ser. LNCS, 2006.
DOI : 10.1007/11754008_22

J. Bryans, M. Koutny, L. Mazaré, and P. Y. Ryan, Opacity generalised to transition systems, International Journal of Information Security, 2008.

R. Alur, P. Cern´ycern´y, and S. Zdancewic, Preserving Secrecy Under Refinement, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, pp.107-118, 2006.
DOI : 10.1007/11787006_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.322

J. Bryans, M. Koutny, L. Mazaré, and P. Y. Ryan, Opacity generalised to transition systems, Revised Selected Papers of the 3rd International Workshop on Formal Aspects in Security and Trust (FAST'05), ser. LNCS, pp.81-95, 2006.

T. Jéron, H. Marchand, S. Pinchinat, and M. Cordier, Supervision Patterns in Discrete Event Systems Diagnosis, 2006 8th International Workshop on Discrete Event Systems, 2006.
DOI : 10.1109/WODES.2006.1678440

E. Badouel, M. Bednarczyk, A. Borzyszkowski, B. Caillaud, and P. Darondeau, Concurrent secrets, 8th Workshop on Discrete Event Systems, WODES'06, 2006.
DOI : 10.1109/wodes.2006.1678407

URL : https://hal.archives-ouvertes.fr/inria-00070249

J. Dubreil, T. Jéron, and H. Marchand, Monitoring information flow by diagnosis techniques, IRISA, Tech. Rep, 1901.
URL : https://hal.archives-ouvertes.fr/inria-00312747

M. Sampath, R. Sengupta, S. Lafortune, K. Sinaamohideen, and D. Teneketzis, Diagnosability of discrete-event systems, IEEE Transactions on Automatic Control, vol.40, issue.9, 1995.
DOI : 10.1109/9.412626

T. Jéron, H. Marchand, S. Genc, and S. Lafortune, Predictability of Sequence Patterns in Discrete Event Systems, IFAC World Congress, 2008.
DOI : 10.3182/20080706-5-KR-1001.00091

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005.
DOI : 10.1007/s10207-004-0046-8