Transforming out timing leaks, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, 2000. ,
DOI : 10.1145/325694.325702
Non-disclosure for distributed mobile code In: Foundations of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, 2005. ,
On declassification and the nondisclosure policy, Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW'05, 2005. ,
Typing noninterference for reactive programs, Proceedings of the Workshop on Foundations of Computer Security, 2004. ,
URL : https://hal.archives-ouvertes.fr/inria-00070413
An Axiomatic Approach to Information Flow in Programs, ACM Transactions on Programming Languages and Systems, vol.2, issue.1, pp.56-76, 1980. ,
DOI : 10.1145/357084.357088
Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005. ,
DOI : 10.1017/S0956796804005453
Secure computer system: unified exposition and multics interpretation, 1976. ,
Modelling downgrading in information flow security, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 2004. ,
DOI : 10.1109/CSFW.2004.1310741
ULM: A Core Programming Model for Global Computing, Programming Languages and Systems: 13th European Symposium on Programming, 2004. ,
DOI : 10.1007/978-3-540-24725-8_17
A generic membrane model In: Global Computing: IST/FET International Workshop, Lecture Notes in Computer Science, vol.3267, 2005. ,
On Typing Information Flow, Lecture Notes in Computer Science, vol.3722, 2005. ,
DOI : 10.1007/11560647_24
Noninterference for concurrent programs and thread systems, Theoretical Computer Science, vol.281, issue.1-2, pp.109-130, 2002. ,
DOI : 10.1016/S0304-3975(02)00010-5
URL : https://hal.archives-ouvertes.fr/inria-00072334
Analysis of formal models of distribution and mobility: state of the art, 2002. ,
The SL synchronous language, IEEE Transactions on Software Engineering, vol.22, issue.4, pp.256-266, 1996. ,
DOI : 10.1109/32.491649
URL : https://hal.archives-ouvertes.fr/inria-00074168
Boxed Ambients, Lecture Notes in Computer Science, vol.2215, pp.38-63, 2001. ,
DOI : 10.1007/3-540-45500-0_2
URL : https://hal.archives-ouvertes.fr/hal-00152525
Mobile ambients, Theoretical Computer Science, vol.240, issue.1, pp.177-213, 2000. ,
DOI : 10.1016/S0304-3975(99)00231-5
Security policies for downgrading, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, 2004. ,
DOI : 10.1145/1030083.1030110
Quantified interference: information theory and information flow, Proceedings of the Workshop on Issues in the Theory of Security, 2004. ,
Information transmission in computational systems, Proceedings of the sixth ACM symposium on Operating systems principles, 1977. ,
Information Flow Security for Boxed Ambients, Electronic Notes in Theoretical Computer Science, vol.66, issue.3, 2002. ,
DOI : 10.1016/S1571-0661(04)80417-1
A monadic analysis of information flow security with mutable state, Journal of Functional Programming, vol.15, issue.2, p.15, 2005. ,
DOI : 10.1017/S0956796804005441
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Approximate noninterference, Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02, 2002. ,
Providing flexibility in information flow control for object oriented systems, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997. ,
DOI : 10.1109/SECPRI.1997.601328
A Classification of Security Properties for Process Algebras1, Journal of Computer Security, vol.3, issue.1, pp.5-33, 1995. ,
DOI : 10.3233/JCS-1994/1995-3103
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, 1982. ,
DOI : 10.1109/SP.1982.10014
The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, 1998. ,
DOI : 10.1145/268946.268976
Information flow vs. resource access in the asynchronous pi-calculus, ACM Transactions on Programming Languages and Systems, vol.24, issue.5, pp.566-591, 2002. ,
DOI : 10.1145/570886.570890
Dynamic updating of information-flow policies, Proceedings of the International Workshop on Foundations of Computer Security (FCS), 2005. ,
A uniform type structure for secure information flow, Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages POPL '02, 2002. ,
Secure Information Flow as Typed Process Behaviour, Programming Languages and Systems: 9th European Symposium on Programming, 2000. ,
DOI : 10.1007/3-540-46425-5_12
The enforcement of security policies for computation, Proceedings of the fifth ACM symposium on Operating systems principles, 1975. ,
Mobile functions and secure information flow, Proceedings of the 27th International Colloquium on Automata, Languages, and Programming, 2000. ,
A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
DOI : 10.1145/362375.362389
Semantics and Program Analysis of Computationally Secure Information Flow, Programming Languages and Systems: 10th European Symposium on Programming, 2001. ,
DOI : 10.1007/3-540-45309-1_6
Handling Encryption in an Analysis for Secure Information Flow, Programming Languages and Systems: 12th European Symposium on Programming, 2003. ,
DOI : 10.1007/3-540-36575-3_12
Downgrading policies and relaxed noninterference, Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, 2005. ,
DOI : 10.1145/1040305.1040319
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.9195
Information integrity policies, Proceedings of the First Workshop on Formal Aspects in Security and Trust (FAST), 2003. ,
Semantic models for information flow, Theoretical Computer Science, vol.315, issue.1, pp.209-256, 2004. ,
DOI : 10.1016/j.tcs.2003.11.019
Polymorphic effect systems, Proceedings of the 15th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '88, 1988. ,
DOI : 10.1145/73560.73564
Information Flow Control and Applications ??? Bridging a Gap ???, Formal Methods for Increasing Software Productivity: International Symposium of Formal Methods Europe, 2001. ,
DOI : 10.1007/3-540-45251-6_9
A unifying approach to the security of distributed and multi-threaded programs1, Journal of Computer Security, vol.11, issue.4, pp.615-676, 2004. ,
DOI : 10.3233/JCS-2003-11406
Controlled Declassification Based on Intransitive Noninterference, Lecture Notes in Computer Science, vol.3302, 2004. ,
DOI : 10.1007/978-3-540-30477-7_9
The definition of Standard ML (Revised), 1997. ,
Complete, safe information flow with decentralized labels, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), 1998. ,
DOI : 10.1109/SECPRI.1998.674834
Enforcing robust declassification, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 2004. ,
DOI : 10.1109/CSFW.2004.1310740
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.2865
A decentralized model for information flow control, Proceedings of the sixteenth ACM symposium on Operating systems principles SOSP '97, 1997. ,
Protecting privacy using the decentralized label model, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp.410-442, 2000. ,
DOI : 10.1109/FITS.2003.1264929
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, 1999. ,
DOI : 10.1145/292540.292561
Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003. ,
DOI : 10.1145/596980.596983
Lexically scoping distribution: what you see is what you get In: FGC: Foundations of Global Computing, Electronic Notes in Theoretical Computer Science, vol.85, issue.1, 2003. ,
What is intransitive noninterference?, Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999. ,
DOI : 10.1109/CSFW.1999.779776
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.425
Noninterference, transitivity, and channel-control security policies, 1992. ,
Non-interference, who needs it?, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930149
The impact of synchronization on secure information flow in concurrent programs, Proceedings of Andrei Ershov 4th International Conference on Perspectives of System Informatics, 2001. ,
Static Confidentiality Enforcement for Distributed Programs, Static Analysis : 9th International Symposium, 2002. ,
DOI : 10.1007/3-540-45789-5_27
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, 2003. ,
DOI : 10.1109/JSAC.2002.806121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979
A Model for Delimited Information Release, International Symposium on Software Security (ISSS'03), 2004. ,
DOI : 10.1007/978-3-540-37621-7_9
Probabilistic noninterference for multithreaded programs, Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW'00, 2000. ,
Dimensions and principles of declassification, Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW'05, 2005. ,
Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993. ,
DOI : 10.1109/2.241422
A Calculus with Code Mobility, Proc. 2nd IFIP Workshop on Formal Methods for Open Object-Based Distributed Systems (FMOODS). Chapman and Hall, 1997. ,
DOI : 10.1007/978-0-387-35261-9_3
The Flow Caml System: documentation and user's manual, Institut National de Recherche en Informatique et en Automatique (INRIA), 2003. ,
A new type system for secure information flow, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930141
Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, 1998. ,
DOI : 10.1145/268946.268975
Run-time principals in information-flow type systems, IEEE Symposium on Security and Privacy, 2004. ,
Secure introduction of one-way functions, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 2000. ,
DOI : 10.1109/CSFW.2000.856941
Eliminating covert flows with minimum typings, Proceedings 10th Computer Security Foundations Workshop, 1997. ,
DOI : 10.1109/CSFW.1997.596807
Probabilistic noninterference in a concurrent language, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), 1999. ,
DOI : 10.1109/CSFW.1998.683153
Verifying secrets and relative secrecy, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, 2000. ,
DOI : 10.1145/325694.325729
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304
A Syntactic Approach to Type Soundness, Information and Computation, vol.115, issue.1, pp.38-94, 1994. ,
DOI : 10.1006/inco.1994.1093
A Type System for Robust Declassification, Proceedings of the Nineteenth Conference on the Mathematical Foundations of Programming Semantics, 2003. ,
DOI : 10.1016/S1571-0661(03)50014-7
Challenges for information-flow security, 1st International Workshop on the Programming Language Interference and Dependence, 2004. ,
Secure information flow via linear continuations, Higher-Order and Symbolic Computation, vol.15, issue.2/3, pp.209-234, 2002. ,
DOI : 10.1023/A:1020843229247
Secure program partitioning, ACM Transactions on Computer Systems, vol.20, issue.3, pp.283-328, 2002. ,
DOI : 10.1145/566340.566343
Dynamic security labels and noninterference, Proceedings of the 2nd International Workshop on Formal Aspects in security and Trust (FAST), 2004. ,