S. Abiteboul, O. Benjelloun, B. Cautis, and T. Milo, Active XML, Security and Access Control, pp.13-22, 2004.

S. Abiteboul, P. Buneman, and D. Suciu, Data on the Web : From Relations to Semistructured Data and XML. Data Management Systems, 1999.

A. Ahern and N. Yoshida, Formalising Java RMI with Explicit Code Mobility, OOPSLA'05, pp.403-422, 2005.

L. Cardelli and G. Ghelli, A Query Language Based on the Ambient Logic, LNCS, vol.2028, issue.01, pp.1-22, 2004.
DOI : 10.1007/3-540-45309-1_1

L. Cardelli, G. Ghelli, and A. D. Gordon, Types for the Ambient Calculus, Information and Computation, vol.177, issue.2, pp.160-194, 2002.
DOI : 10.1016/S0890-5401(01)93121-9

G. Castagna, J. Vitek, and F. Z. Nardelli, The Seal Calculus, Information and Computation, vol.201, issue.1, pp.1-54, 2005.
DOI : 10.1016/j.ic.2004.11.005

URL : https://hal.archives-ouvertes.fr/hal-00152521

M. Coppo, F. Cozzi, M. Dezani-ciancaglini, E. Giovannetti, and R. Pugliese, A Mobility Calculus with Local and Dependent Types, Aart Middeldorp van Raamsdonk, and Roel de Vrijer Processes, Terms and Cycles: Steps on the Road to Infinity, pp.404-444, 2005.
DOI : 10.1007/11601548_20

M. Dezani-ciancaglini, S. Ghilezan, and J. Pantovic, Security Types for Dynamic Web Data, TGC'06, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00149049

P. Gardner and S. Maffeis, Modelling dynamic web data, Theoretical Computer Science, vol.342, issue.1, pp.104-131, 2005.
DOI : 10.1016/j.tcs.2005.06.006

M. Hennessy and J. Riely, Resource Access Control in Systems of Mobile Agents, Information and Computation, vol.173, issue.1, pp.82-120, 2002.
DOI : 10.1006/inco.2001.3089

M. Hennessy and J. Riely, Information flow vs. resource access in the asynchronous pi-calculus, ACM Transactions on Programming Languages and Systems, vol.24, issue.5, pp.566-591, 2003.
DOI : 10.1145/570886.570890

M. Hennessy and J. Rathke, Typed behavioural equivalences for processes in the presence of subtyping, Mathematical Structures in Computer Science, vol.14, issue.5, pp.651-684, 2003.
DOI : 10.1017/S0960129504004281

J. Kiniry, A. Morkan, F. Fairmichael, D. Cochran, and P. Chalin, Martijn Oostdijk, and Engelbert Hubbers. The KOA Remote Voting System: A Summary of Work To-Date, TGC'06, 2007.

S. Maffeis and P. Gardner, Behavioural Equivalencies for Dynamic Web Data, TCS'04, pp.541-554, 2004.

R. Milner, J. Parrow, and D. Walker, A Calculus of Mobile Processes, I-II. Information and Computation, pp.1-77, 1992.

R. De-nicola, G. Ferrari, R. Pugliese, and B. Venneri, Types for access control, Theoretical Computer Science, vol.240, issue.1, pp.215-254, 2000.
DOI : 10.1016/S0304-3975(99)00232-7

B. Pierce and D. Sangiorgi, Behavioral equivalence in the polymorphic pi-calculus, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.531-584, 2000.
DOI : 10.1145/263699.263729

URL : https://hal.archives-ouvertes.fr/inria-00073650

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

A. Sahuguet, ubQL: A Distributed Query Language to Program Distributed Query Systems, 2002.

R. S. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993.
DOI : 10.1109/2.241422

D. Sangiorgi and D. Walker, The ?-calculus: a Theory of Mobile Processes, 2001.

S. Zdancewic, Challenges for Information-flow Security, 2004.