References

  1. A. Askarov & A. Sabelfeld (2009): Tight Enforcement of Information-Release Policies for Dynamic Languages. In: Proc. CSF'09. IEEE Computer Society, pp. 43–59.
  2. Adam Barth, John Mitchell, Anupam Datta & Sharada Sundaram (2007): Privacy and Utility in Business Processes. In: Proc. CSF'07. IEEE Computer Society, pp. 279–294.
  3. K. Bhargavan, R. Corin, P. M. Deniélou, C. Fournet & J. J. Leifer (2009): Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. In: Proc. CSF'09. IEEE Computer Society, pp. 124–140.
  4. G. Boudol (2009): Secure Information Flow as a Safety Property. In: Proc. FAST'08, LNCS 5491. Springer, pp. 20–34.
  5. S. Capecchi, I. Castellani, M. Dezani Ciancaglini & T. Rezk (2010): Session Types for Access and Information Flow Control. In: Proc. CONCUR'10, LNCS 6269. Springer, pp. 237–252.
  6. M. Dezani-Ciancaglini & U. de' Liguoro (2010): Sessions and Session Types: an Overview. In: Proc. WS-FM'09, LNCS 6194. Springer, pp. 1–28.
  7. R. Focardi & S. Rossi (2002): Information Flow Security in Dynamic Contexts. In: Proc. CSFW'02). IEEE Computer Society Press, pp. 307–319.
  8. G. Le Guernic, A. Banerjee, T. Jensen & D. A. Schmidt (2007): Automata-based Confidentiality Monitoring. In: Proc. ASIAN'06, LNCS 4435. Springer, pp. 75–89.
  9. K. Honda, N. Yoshida & M. Carbone (2008): Multiparty Asynchronous Session Types. In: Proc. POPL'08. ACM Press, pp. 273–284, doi:10.1145/1328438.1328472.
  10. A. Lapadula, R. Pugliese & F. Tiezzi (2007): Regulating Data Exchange in Service Oriented Applications. In: Proc. FSEN'07, LNCS 4767. Springer, pp. 223–239.
  11. R. Milner (1999): Communicating and Mobile Systems: the Pi-Calculus. CUP.
  12. A. C. Myers & B. Liskov (2000): Protecting Privacy using the Decentralized Label Model. ACM Transactions on Software Engineering and Methodology 9, pp. 410–442, doi:10.1145/363516.363526.
  13. J. Planul, R. Corin & C. Fournet (2009): Secure Enforcement for Global Process Specifications. In: Proc. CONCUR'09, LNCS 5710. Springer, pp. 511–526.
  14. A. Sabelfeld & A. Russo (2010): From Dynamic to Static and Back: Riding the Roller Coaster of Information-flow Control Research. In: Proc. PSI'06, LNCS 5947. Springer, pp. 352–365.
  15. K. Takeuchi, K. Honda & M. Kubo (1994): An Interaction-based Language and its Typing System. In: Proc. PARLE'94, LNCS 817. Springer, pp. 398–413.
  16. L. Zheng & A. C. Myers (2007): Dynamic Security Labels and Static Information Flow Control. International Journal of Information Security 6, pp. 67–84, doi:10.1007/s10207-007-0019-9.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org