R. Alur, P. Cern´ycern´y, and S. Zdancewic, Preserving Secrecy Under Refinement, ICALP '06: Proceedings (Part II) of the 33rd International Colloquium on Automata , Languages and Programming, pp.107-118, 2006.
DOI : 10.1007/11787006_10

E. Badouel, M. Bednarczyk, A. Borzyszkowski, B. Caillaud, and P. Darondeau, Concurrent secrets. Discrete Event Dynamic Systems, pp.425-446, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00070249

M. Bishop, Introduction to computer security, 2004.

B. Blanchet, ;. M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.331-340, 2005.
DOI : 10.1109/LICS.2005.8

J. W. Bryans, M. Koutny, L. Mazaré, and P. Ryan, Opacity generalised to transition systems, International Journal of Information Security, vol.79, issue.3???4, pp.421-435, 2008.
DOI : 10.1007/s10207-008-0058-x

C. Cassandras and S. Lafortune, Introduction to Discrete Event Systems, 1999.

C. Constant, T. Jéron, H. Marchand, and V. Rusu, Integrating formal verification and conformance testing for reactive systems, IEEE Transactions on Software Engineering, vol.33, issue.8, pp.558-574, 2007.
DOI : 10.1109/TSE.2007.70707

URL : https://hal.archives-ouvertes.fr/inria-00422904

V. Darmaillacq, J. Fernandez, R. Groz, L. Mounier, and J. Richier, Test Generation for Network Security Rules, TestCom, 2006.
DOI : 10.1007/11754008_22

J. Dubreil, . Ph, H. Darondeau, and . Marchand, Opacity enforcing control synthesis, 2008 9th International Workshop on Discrete Event Systems, 2008.
DOI : 10.1109/WODES.2008.4605918

URL : https://hal.archives-ouvertes.fr/inria-00344269

J. Dubreil, . Ph, H. Darondeau, and . Marchand, Supervisory Control for Opacity, IEEE Transactions on Automatic Control, vol.55, issue.5, 1921.
DOI : 10.1109/TAC.2010.2042008

URL : https://hal.archives-ouvertes.fr/inria-00483891

J. Dubreil, T. Jéron, and H. Marchand, Monitoring information flow by diagnosis techniques, European Control Conference (ECC), 2009.
URL : https://hal.archives-ouvertes.fr/inria-00312747

R. Giacobazzi and I. Mastroeni, Abstract non-interference: parameterizing noninterference by abstract interpretation, POPL '04: Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.186-197, 2004.

G. Lowe, Towards a completeness result for model checking of security protocols, Journal of Computer Security, vol.7, issue.2-3, pp.89-146, 1999.
DOI : 10.3233/JCS-1999-72-302

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

J. Tretmans, Testing Concurrent Systems: A Formal Approach, Concurrency Theory (CONCUR'99), number 1664 in LNCS, pp.46-65, 1999.
DOI : 10.1007/3-540-48320-9_6