A. , A. Matos, and G. Boudol, On Declassification and the Non-Disclosure Policy, Journal of Computer Security, pp.549-597, 2009.

L. Bettini, M. Coppo, L. D. Antoni, M. De-luca, M. Dezani-ciancaglini et al., Global Progress in Dynamically Interleaved Multiparty Sessions, Proc. CONCUR'08, pp.418-433, 2008.
DOI : 10.1007/978-3-540-85361-9_33

K. Bhargavan, R. Corin, P. Deniélou, C. Fournet, and J. J. Leifer, Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, pp.124-140, 2009.
DOI : 10.1109/CSF.2009.26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.187

M. Boreale, R. Bruni, R. Nicola, and M. Loreti, Sessions and Pipelines for Structured Service Programming, Proc. FMOODS '08, pp.19-38, 2008.
DOI : 10.1007/978-3-540-68863-1_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.596.9844

G. Boudol, Secure Information Flow as a Safety Property, Proc. FAST'08, pp.20-34, 2009.
DOI : 10.1007/978-3-642-01465-9_2

G. Boudol and I. Castellani, Noninterference for concurrent programs and thread systems, Theoretical Computer Science, vol.281, issue.1-2, pp.109-130, 2002.
DOI : 10.1016/S0304-3975(02)00010-5

URL : https://hal.archives-ouvertes.fr/inria-00072334

G. Boudol and M. Kolundzija, Access Control and Declassification, Proc. Computer Network Security, pp.85-98, 2007.
DOI : 10.1007/978-3-540-73986-9_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.4618

S. Capecchi, I. Castellani, M. Dezani-ciancaglini, and T. Rezk, Session Types for Access and Information Flow Control, Proc. CONCUR'10, 2010.
DOI : 10.1007/978-3-642-15375-4_17

URL : https://hal.archives-ouvertes.fr/inria-00511304

D. E. Denning, Cryptography and Data Security, 1982.

M. Dezani-ciancaglini and U. De-'liguoro, Sessions and Session Types: An Overview, Proc. WSFM'09, pp.1-28, 2010.
DOI : 10.1007/978-3-642-14458-5_1

R. Focardi and R. Gorrieri, Classification of Security Properties (Part I: Information Flow), Proc. FOSAD'00, pp.331-396, 2001.

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

K. Honda and N. Yoshida, A Uniform Type Structure for Secure Information Flow, Proc. POPL'02, pp.81-92, 2002.

K. Honda, N. Yoshida, and M. Carbone, Multiparty Asynchronous Session Types, Proc. POPL'08, pp.273-284, 2008.
DOI : 10.1145/1328438.1328472

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.7594

N. Kobayashi, Type-based information flow analysis for the ??-calculus, Acta Informatica, vol.15, issue.2/3, pp.291-347, 2005.
DOI : 10.1007/s00236-005-0179-x

M. Kolundzija, Security Types for Sessions and Pipelines, Proc. WSFM'08, pp.175-190, 2009.
DOI : 10.3233/JCS-1996-42-304

R. Milner, Communicating and Mobile Systems: the Pi-Calculus. CUP, 1999.

B. C. Pierce, Types and Programming Languages, 2002.

J. Planul, R. Corin, and C. Fournet, Secure Enforcement for Global Process Specifications, Proc. CONCUR'09, pp.511-526
DOI : 10.1007/BFb0053567

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

A. Sabelfeld and D. Sands, Probabilistic noninterference for multi-threaded programs, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.200-214, 2000.
DOI : 10.1109/CSFW.2000.856937

A. Sabelfeld and D. Sands, Dimensions and Principles of Declassification, Proc. CSFW'05, 2005.

G. Smith and D. Volpano, Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.355-364, 1998.
DOI : 10.1145/268946.268975

K. Takeuchi, K. Honda, and M. Kubo, An interaction-based language and its typing system, Proc. PARLE'94, pp.398-413
DOI : 10.1007/3-540-58184-7_118

D. Volpano, C. Irvine, and G. Smith, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.
DOI : 10.3233/JCS-1996-42-304