Preserving Secrecy Under Refinement, ICALP '06: Proceedings (Part II) of the 33rd International Colloquium on Automata , Languages and Programming, pp.107-118, 2006. ,
DOI : 10.1007/11787006_10
Concurrent secrets. Discrete Event Dynamic Systems, pp.425-446, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00070249
Introduction to computer security, 2004. ,
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.331-340, 2005. ,
DOI : 10.1109/LICS.2005.8
Opacity generalised to transition systems, International Journal of Information Security, vol.79, issue.3???4, pp.421-435, 2008. ,
DOI : 10.1007/s10207-008-0058-x
Introduction to Discrete Event Systems, 1999. ,
Integrating formal verification and conformance testing for reactive systems, IEEE Transactions on Software Engineering, vol.33, issue.8, pp.558-574, 2007. ,
DOI : 10.1109/TSE.2007.70707
URL : https://hal.archives-ouvertes.fr/inria-00422904
Test Generation for Network Security Rules, TestCom, 2006. ,
DOI : 10.1007/11754008_22
Opacity enforcing control synthesis, 2008 9th International Workshop on Discrete Event Systems, 2008. ,
DOI : 10.1109/WODES.2008.4605918
URL : https://hal.archives-ouvertes.fr/inria-00344269
Supervisory Control for Opacity, IEEE Transactions on Automatic Control, vol.55, issue.5, 1921. ,
DOI : 10.1109/TAC.2010.2042008
URL : https://hal.archives-ouvertes.fr/inria-00483891
Monitoring information flow by diagnosis techniques, European Control Conference (ECC), 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00312747
Abstract non-interference: parameterizing noninterference by abstract interpretation, POPL '04: Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.186-197, 2004. ,
Towards a completeness result for model checking of security protocols, Journal of Computer Security, vol.7, issue.2-3, pp.89-146, 1999. ,
DOI : 10.3233/JCS-1999-72-302
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
Testing Concurrent Systems: A Formal Approach, Concurrency Theory (CONCUR'99), number 1664 in LNCS, pp.46-65, 1999. ,
DOI : 10.1007/3-540-48320-9_6