A. Aiken, Introduction to set constraint-based program analysis, Science of Computer Programming, vol.35, issue.2-3, pp.79-111, 1999.
DOI : 10.1016/S0167-6423(99)00007-6

M. Bartoletti, P. Degano, and G. L. Ferrari, Static Analysis for Stack Inspection, Electronic Notes in Theoretical Computer Science, vol.54, 2001.
DOI : 10.1016/S1571-0661(04)00236-1

M. Bartoletti, P. Degano, and G. L. Ferrari, History-Based Access Control with Local Policies, Proceedings of the 8th International Conference on Foundations of Software Science and Computational Structures (FOSSACS 2005), pp.316-332, 2005.
DOI : 10.1007/978-3-540-31982-5_20

F. Besson, T. De-grenier-de-latour, and T. Jensen, Interfaces for stack inspection, Journal of Functional Programming, vol.15, issue.2, pp.179-217, 2005.
DOI : 10.1017/S0956796804005465

F. Besson, G. Dufay, and T. Jensen, A Formal Model of Access Control for Mobile Interactive Devices, Proceedings of the 11th European Symposium On Research In Computer Security (ESORICS'06), 2006.
DOI : 10.1007/11863908_8

URL : https://hal.archives-ouvertes.fr/inria-00083453

F. Besson, T. Jensen, D. L. Métayer, and T. Thorn, Model checking security properties of control flow graphs, Journal of Computer Security, vol.9, issue.3, pp.217-250, 2001.
DOI : 10.3233/JCS-2001-9303

A. Chander, D. Espinosa, N. Islam, P. Lee, and G. C. Necula, Enforcing Resource Bounds via Static Verification of Dynamic Checks, Proceedings of the 14th European Symposium on Programming (ESOP 2005), pp.311-325, 2005.
DOI : 10.1007/978-3-540-31987-0_22

P. Crégut, Extracting Control from Data: User Interfaces of MIDP Applications, In Trustworthy Global Computing Lecture Notes in Computer Science, vol.4912, 2007.
DOI : 10.1007/978-3-540-78663-4_5

C. Fournet and A. Gordon, Stack inspection: theory and variants, Proceedings of the 29th ACM Symposium on Principles of Programming Languages (POPL'02, 2002.

M. Hennessy and J. Riely, Resource Access Control in Systems of Mobile Agents, Information and Computation, vol.173, issue.1, pp.82-120, 2002.
DOI : 10.1006/inco.2001.3089

A. Igarashi and N. Kobayashi, Resource usage analysis, Proceedings of the 29th ACM Symposium on Principles of Programming Languages (POPL'02), pp.331-342, 2002.

T. Jensen, D. L. Métayer, and T. Thorn, Verification of control flow based security properties, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.89-103, 1999.
DOI : 10.1109/SECPRI.1999.766902

J. Leroux and G. Sutre, Accelerated Data-Flow Analysis, Proceedings of the 14th International Symposium on Static Analysis (SAS'2007), pp.184-199, 2007.
DOI : 10.1007/978-3-540-74061-2_12

URL : https://hal.archives-ouvertes.fr/hal-00346005

J. K. Millen, A resource allocation model for denial of service, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.137-147, 1992.
DOI : 10.1109/RISP.1992.213265

C. George and . Necula, Proof-carrying code, Proceedings of the 24th ACM Symposium on Principles of Programming Languages (POPL'97), pp.106-119, 1997.

. Flemming and . Nielson, Hanne Riis. Nielson, and Chris. Hankin. Principles of Program Analysis, 1999.

D. Pichardie, Bicolano ? Byte Code Language in Coq, 2006.

F. Pottier, C. Skalka, and S. F. Smith, A systematic approach to static access control, Proceedings of the 10th European Symposium on Programming, pp.30-45, 2001.
DOI : 10.1145/1057387.1057392

J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975.
DOI : 10.1109/PROC.1975.9939

Z. Su and D. Wagner, A class of polynomially solvable range constraints for interval analysis without widenings, Theoretical Computer Science, vol.345, issue.1, pp.122-138, 2005.
DOI : 10.1016/j.tcs.2005.07.035