On Declassification and the Non-Disclosure Policy, Journal of Computer Security, pp.549-597, 2009. ,
Global Progress in Dynamically Interleaved Multiparty Sessions, Proc. CONCUR'08, pp.418-433, 2008. ,
DOI : 10.1007/978-3-540-85361-9_33
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, pp.124-140, 2009. ,
DOI : 10.1109/CSF.2009.26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.187
Sessions and Pipelines for Structured Service Programming, Proc. FMOODS '08, pp.19-38, 2008. ,
DOI : 10.1007/978-3-540-68863-1_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.596.9844
Secure Information Flow as a Safety Property, Proc. FAST'08, pp.20-34, 2009. ,
DOI : 10.1007/978-3-642-01465-9_2
Noninterference for concurrent programs and thread systems, Theoretical Computer Science, vol.281, issue.1-2, pp.109-130, 2002. ,
DOI : 10.1016/S0304-3975(02)00010-5
URL : https://hal.archives-ouvertes.fr/inria-00072334
Access Control and Declassification, Proc. Computer Network Security, pp.85-98, 2007. ,
DOI : 10.1007/978-3-540-73986-9_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.4618
Session Types for Access and Information Flow Control, Proc. CONCUR'10, 2010. ,
DOI : 10.1007/978-3-642-15375-4_17
URL : https://hal.archives-ouvertes.fr/inria-00511304
Cryptography and Data Security, 1982. ,
Sessions and Session Types: An Overview, Proc. WSFM'09, pp.1-28, 2010. ,
DOI : 10.1007/978-3-642-14458-5_1
Classification of Security Properties (Part I: Information Flow), Proc. FOSAD'00, pp.331-396, 2001. ,
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
A Uniform Type Structure for Secure Information Flow, Proc. POPL'02, pp.81-92, 2002. ,
Multiparty Asynchronous Session Types, Proc. POPL'08, pp.273-284, 2008. ,
DOI : 10.1145/1328438.1328472
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.7594
Type-based information flow analysis for the ??-calculus, Acta Informatica, vol.15, issue.2/3, pp.291-347, 2005. ,
DOI : 10.1007/s00236-005-0179-x
Security Types for Sessions and Pipelines, Proc. WSFM'08, pp.175-190, 2009. ,
DOI : 10.3233/JCS-1996-42-304
Communicating and Mobile Systems: the Pi-Calculus. CUP, 1999. ,
Types and Programming Languages, 2002. ,
Secure Enforcement for Global Process Specifications, Proc. CONCUR'09, pp.511-526 ,
DOI : 10.1007/BFb0053567
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
Probabilistic noninterference for multi-threaded programs, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.200-214, 2000. ,
DOI : 10.1109/CSFW.2000.856937
Dimensions and Principles of Declassification, Proc. CSFW'05, 2005. ,
Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.355-364, 1998. ,
DOI : 10.1145/268946.268975
An interaction-based language and its typing system, Proc. PARLE'94, pp.398-413 ,
DOI : 10.1007/3-540-58184-7_118
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304