References

  1. Massimo Bartoletti, Ilaria Castellani, Pierre-Malo Deniélou, Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Jovanka Pantovic, Jorge A. Pérez, Peter Thiemann, Bernardo Toninho & Hugo Torres Vieira (2015): Combining Behavioural Types with Security Analysis. Journal of Logical and Algebraic Methods in Programming 84(6), pp. 763 – 780, doi:10.1016/j.jlamp.2015.09.003. Special Issue on Open Problems in Concurrency Theory.
  2. Andi Bejleri & Nobuko Yoshida (2009): Synchronous Multiparty Session Types. In: Vasco T. Vasconcelos & Nobuko Yoshida: Proc. PLACES, ENTCS 241, pp. 3–33, doi:10.1016/j.entcs.2009.06.002.
  3. Sara Capecchi, Ilaria Castellani & Mariangiola Dezani-Ciancaglini (2014): Typing Access Control and Secure Information Flow in Sessions. Information and Computation 238, pp. 68–105, doi:10.1016/j.ic.2014.07.005.
  4. Sara Capecchi, Ilaria Castellani & Mariangiola Dezani-Ciancaglini (2016): Information Flow Safety in Multiparty Sessions. Mathematical Structures in Computer Science. To appear.
  5. Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Jovanka Pantovic Svetlana Jaksic & Nobuko Yoshida (2016): Precise Subtyping for Synchronous Multiparty Sessions. In: Simon Gay: Proc. PLACES, EPTCS 203, pp. 29 – 44, doi:10.4204/EPTCS.203.3.
  6. Kohei Honda, Nobuko Yoshida & Marco Carbone (2008): Multiparty Asynchronous Session Types. In: George C. Necula & Philip Wadler: Proc. POPL. ACM Press, pp. 273–284, doi:10.1145/1328438.1328472.
  7. Luísa Lourenço & Luís Caires (2015): Dependent Information Flow Types. In: Sriram K. Rajamani & David Walker: Proc. POPL. ACM Press, pp. 317–328, doi:10.1145/2676726.2676994.
  8. B. C. Pierce (2002): Types and Programming Languages. MIT Press.
  9. Andrei Sabelfeld & David Sands (2009): Declassification: Dimensions and principles. Journal of Computer Security 17(5), pp. 517–548, doi:10.3233/JCS-2009-0352.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org