J. Agat, Transforming out timing leaks, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, 2000.
DOI : 10.1145/325694.325702

A. Matos and A. , Non-disclosure for distributed mobile code In: Foundations of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, 2005.

A. Matos, A. Boudol, and G. , On declassification and the nondisclosure policy, Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW'05, 2005.

A. Matos, A. Boudol, G. Castellani, and I. , Typing noninterference for reactive programs, Proceedings of the Workshop on Foundations of Computer Security, 2004.
URL : https://hal.archives-ouvertes.fr/inria-00070413

G. R. Andrews and R. P. Reitman, An Axiomatic Approach to Information Flow in Programs, ACM Transactions on Programming Languages and Systems, vol.2, issue.1, pp.56-76, 1980.
DOI : 10.1145/357084.357088

. Banerjee, &. Anindya, . Naumann, and A. David, Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005.
DOI : 10.1017/S0956796804005453

D. E. Bell and L. J. La-padula, Secure computer system: unified exposition and multics interpretation, 1976.

A. Bossi, C. Piazza, and S. Rossi, Modelling downgrading in information flow security, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 2004.
DOI : 10.1109/CSFW.2004.1310741

G. Boudol, ULM: A Core Programming Model for Global Computing, Programming Languages and Systems: 13th European Symposium on Programming, 2004.
DOI : 10.1007/978-3-540-24725-8_17

G. Boudol, A generic membrane model In: Global Computing: IST/FET International Workshop, Lecture Notes in Computer Science, vol.3267, 2005.

G. Boudol, On Typing Information Flow, Lecture Notes in Computer Science, vol.3722, 2005.
DOI : 10.1007/11560647_24

G. Boudol and I. Castellani, Noninterference for concurrent programs and thread systems, Theoretical Computer Science, vol.281, issue.1-2, pp.109-130, 2002.
DOI : 10.1016/S0304-3975(02)00010-5

URL : https://hal.archives-ouvertes.fr/inria-00072334

G. Boudol, I. Castellani, F. Germain, and M. Lacoste, Analysis of formal models of distribution and mobility: state of the art, 2002.

F. Boussinot and R. Simone, The SL synchronous language, IEEE Transactions on Software Engineering, vol.22, issue.4, pp.256-266, 1996.
DOI : 10.1109/32.491649

URL : https://hal.archives-ouvertes.fr/inria-00074168

M. Bugliesi, G. Castagna, and S. Crafa, Boxed Ambients, Lecture Notes in Computer Science, vol.2215, pp.38-63, 2001.
DOI : 10.1007/3-540-45500-0_2

URL : https://hal.archives-ouvertes.fr/hal-00152525

L. Cardelli and A. D. Gordon, Mobile ambients, Theoretical Computer Science, vol.240, issue.1, pp.177-213, 2000.
DOI : 10.1016/S0304-3975(99)00231-5

S. Chong and A. C. Myers, Security policies for downgrading, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, 2004.
DOI : 10.1145/1030083.1030110

D. Clark, S. Hunt, and P. Malacaria, Quantified interference: information theory and information flow, Proceedings of the Workshop on Issues in the Theory of Security, 2004.

E. Cohen, Information transmission in computational systems, Proceedings of the sixth ACM symposium on Operating systems principles, 1977.

S. Crafa, M. Bugliesi, and G. Castagna, Information Flow Security for Boxed Ambients, Electronic Notes in Theoretical Computer Science, vol.66, issue.3, 2002.
DOI : 10.1016/S1571-0661(04)80417-1

K. Crary, A. Kliger, and F. Pfenning, A monadic analysis of information flow security with mutable state, Journal of Functional Programming, vol.15, issue.2, p.15, 2005.
DOI : 10.1017/S0956796804005441

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

D. Pierro, A. Hankin, C. Wiklicky, and H. , Approximate noninterference, Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02, 2002.

E. Ferrari, P. Samarati, E. Bertino, and S. Jajodia, Providing flexibility in information flow control for object oriented systems, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997.
DOI : 10.1109/SECPRI.1997.601328

R. Focardi and R. Gorrieri, A Classification of Security Properties for Process Algebras1, Journal of Computer Security, vol.3, issue.1, pp.5-33, 1995.
DOI : 10.3233/JCS-1994/1995-3103

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, 1982.
DOI : 10.1109/SP.1982.10014

N. Heintze and J. G. Riecke, The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, 1998.
DOI : 10.1145/268946.268976

M. Hennessy and J. Riely, Information flow vs. resource access in the asynchronous pi-calculus, ACM Transactions on Programming Languages and Systems, vol.24, issue.5, pp.566-591, 2002.
DOI : 10.1145/570886.570890

M. Hicks, S. Tse, B. Hicks, and S. Zdancewic, Dynamic updating of information-flow policies, Proceedings of the International Workshop on Foundations of Computer Security (FCS), 2005.

K. Honda and N. Yoshida, A uniform type structure for secure information flow, Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages POPL '02, 2002.

K. Honda, V. Vasconcelos, and N. Yoshida, Secure Information Flow as Typed Process Behaviour, Programming Languages and Systems: 9th European Symposium on Programming, 2000.
DOI : 10.1007/3-540-46425-5_12

A. K. Jones and R. J. Lipton, The enforcement of security policies for computation, Proceedings of the fifth ACM symposium on Operating systems principles, 1975.

D. K?rl?, Mobile functions and secure information flow, Proceedings of the 27th International Colloquium on Automata, Languages, and Programming, 2000.

B. W. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

P. Laud, Semantics and Program Analysis of Computationally Secure Information Flow, Programming Languages and Systems: 10th European Symposium on Programming, 2001.
DOI : 10.1007/3-540-45309-1_6

P. Laud, Handling Encryption in an Analysis for Secure Information Flow, Programming Languages and Systems: 12th European Symposium on Programming, 2003.
DOI : 10.1007/3-540-36575-3_12

P. Li and S. Zdancewic, Downgrading policies and relaxed noninterference, Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, 2005.
DOI : 10.1145/1040305.1040319

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.9195

P. Li, Y. Mao, and S. Zdancewic, Information integrity policies, Proceedings of the First Workshop on Formal Aspects in Security and Trust (FAST), 2003.

G. Lowe, Semantic models for information flow, Theoretical Computer Science, vol.315, issue.1, pp.209-256, 2004.
DOI : 10.1016/j.tcs.2003.11.019

J. M. Lucassen and D. K. Gifford, Polymorphic effect systems, Proceedings of the 15th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '88, 1988.
DOI : 10.1145/73560.73564

H. Mantel, Information Flow Control and Applications ??? Bridging a Gap ???, Formal Methods for Increasing Software Productivity: International Symposium of Formal Methods Europe, 2001.
DOI : 10.1007/3-540-45251-6_9

H. Mantel and A. Sabelfeld, A unifying approach to the security of distributed and multi-threaded programs1, Journal of Computer Security, vol.11, issue.4, pp.615-676, 2004.
DOI : 10.3233/JCS-2003-11406

H. Mantel and D. Sands, Controlled Declassification Based on Intransitive Noninterference, Lecture Notes in Computer Science, vol.3302, 2004.
DOI : 10.1007/978-3-540-30477-7_9

R. Milner, M. Tofte, R. Harper, and D. Macqueen, The definition of Standard ML (Revised), 1997.

A. Myers and B. Liskov, Complete, safe information flow with decentralized labels, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), 1998.
DOI : 10.1109/SECPRI.1998.674834

A. Myers, A. Sabelfeld, and S. Zdancewic, Enforcing robust declassification, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 2004.
DOI : 10.1109/CSFW.2004.1310740

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.2865

A. C. Myers and B. Liskov, A decentralized model for information flow control, Proceedings of the sixteenth ACM symposium on Operating systems principles SOSP '97, 1997.

A. C. Myers and B. Liskov, Protecting privacy using the decentralized label model, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp.410-442, 2000.
DOI : 10.1109/FITS.2003.1264929

A. C. Myers, JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, 1999.
DOI : 10.1145/292540.292561

F. Pottier and V. Simonet, Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003.
DOI : 10.1145/596980.596983

A. Ravara, A. Matos, V. T. Vasconcelos, and L. Lopes, Lexically scoping distribution: what you see is what you get In: FGC: Foundations of Global Computing, Electronic Notes in Theoretical Computer Science, vol.85, issue.1, 2003.

A. W. Roscoe and M. H. Goldsmith, What is intransitive noninterference?, Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999.
DOI : 10.1109/CSFW.1999.779776

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.425

J. Rushby, Noninterference, transitivity, and channel-control security policies, 1992.

P. Ryan, J. Mclean, J. Millen, and V. Gligor, Non-interference, who needs it?, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930149

A. Sabelfeld, The impact of synchronization on secure information flow in concurrent programs, Proceedings of Andrei Ershov 4th International Conference on Perspectives of System Informatics, 2001.

A. Sabelfeld and H. Mantel, Static Confidentiality Enforcement for Distributed Programs, Static Analysis : 9th International Symposium, 2002.
DOI : 10.1007/3-540-45789-5_27

A. Sabelfeld and A. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, 2003.
DOI : 10.1109/JSAC.2002.806121

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979

A. Sabelfeld and A. Myers, A Model for Delimited Information Release, International Symposium on Software Security (ISSS'03), 2004.
DOI : 10.1007/978-3-540-37621-7_9

A. Sabelfeld and D. Sands, Probabilistic noninterference for multithreaded programs, Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW'00, 2000.

A. Sabelfeld and D. Sands, Dimensions and principles of declassification, Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW'05, 2005.

R. S. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993.
DOI : 10.1109/2.241422

T. Sekiguchi and A. Yonezawa, A Calculus with Code Mobility, Proc. 2nd IFIP Workshop on Formal Methods for Open Object-Based Distributed Systems (FMOODS). Chapman and Hall, 1997.
DOI : 10.1007/978-0-387-35261-9_3

V. Simonet, The Flow Caml System: documentation and user's manual, Institut National de Recherche en Informatique et en Automatique (INRIA), 2003.

G. Smith, A new type system for secure information flow, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930141

G. Smith and D. Volpano, Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, 1998.
DOI : 10.1145/268946.268975

S. Tse and S. Zdancewic, Run-time principals in information-flow type systems, IEEE Symposium on Security and Privacy, 2004.

D. Volpano, Secure introduction of one-way functions, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 2000.
DOI : 10.1109/CSFW.2000.856941

D. Volpano and G. Smith, Eliminating covert flows with minimum typings, Proceedings 10th Computer Security Foundations Workshop, 1997.
DOI : 10.1109/CSFW.1997.596807

D. Volpano and G. Smith, Probabilistic noninterference in a concurrent language, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), 1999.
DOI : 10.1109/CSFW.1998.683153

D. Volpano and G. Smith, Verifying secrets and relative secrecy, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, 2000.
DOI : 10.1145/325694.325729

D. Volpano, G. Smith, and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.
DOI : 10.3233/JCS-1996-42-304

A. K. Wright and M. Felleisen, A Syntactic Approach to Type Soundness, Information and Computation, vol.115, issue.1, pp.38-94, 1994.
DOI : 10.1006/inco.1994.1093

S. Zdancewic, A Type System for Robust Declassification, Proceedings of the Nineteenth Conference on the Mathematical Foundations of Programming Semantics, 2003.
DOI : 10.1016/S1571-0661(03)50014-7

S. Zdancewic, Challenges for information-flow security, 1st International Workshop on the Programming Language Interference and Dependence, 2004.

S. Zdancewic and A. C. Myers, Secure information flow via linear continuations, Higher-Order and Symbolic Computation, vol.15, issue.2/3, pp.209-234, 2002.
DOI : 10.1023/A:1020843229247

S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers, Secure program partitioning, ACM Transactions on Computer Systems, vol.20, issue.3, pp.283-328, 2002.
DOI : 10.1145/566340.566343

L. Zheng and A. Myers, Dynamic security labels and noninterference, Proceedings of the 2nd International Workshop on Formal Aspects in security and Trust (FAST), 2004.