. Bibliographie, ?. R. Alur, and Z. P. Cerný, « Preserving Secrecy Under Refinement, ICALP '06 : Proceedings (Part II) of the 33rd International Colloquium on Automata, Languages and Programming, pp.107-118, 2006.

M. A. Blanchet-b and . Fournet-c, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.331-340, 2005.
DOI : 10.1109/LICS.2005.8

. J. Bryans, . Koutny-m, R. P. Mazaré-l, . Dimitrakos-t, . Martinelli-f et al., Opacity Generalised to Transition Systems, Revised Selected Papers of the 3rd International Workshop on Formal Aspects in Security and Trust (FAST'05), pp.81-95, 2006.
DOI : 10.1007/11679219_7

T. Jéron, P. S. Marchand-h, and C. , Supervision Patterns in Discrete Event Systems Diagnosis, 2006 8th International Workshop on Discrete Event Systems, 2006.
DOI : 10.1109/WODES.2006.1678440

. B. Schneider-f, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382