Development of a Generic Voter under FoCal, Tests and Proofs, Third Int. Conf., TAP 2009, Proceedings, pp.10-26, 2009. ,
DOI : 10.1017/CBO9780511624162
URL : https://hal.archives-ouvertes.fr/hal-01241361
Development Life-cycle of Critical Software Under FoCaL, Electronic Notes in Theoretical Computer Science, vol.243, pp.15-31, 2009. ,
DOI : 10.1016/j.entcs.2009.07.003
URL : https://hal.archives-ouvertes.fr/hal-01195843
Secure Computer Systems: a Mathematical Model, MITRE Corp, 1973. ,
Zenon: An Extensible Automated Theorem Prover Producing Checkable Proofs, Logic for Programming, Artificial Intelligence, and Reasoning , 14th Int. Conf., LPAR, pp.151-165, 2007. ,
DOI : 10.1007/978-3-540-75560-9_13
URL : https://hal.archives-ouvertes.fr/inria-00315920
Some hints for polynomials in the Foc project, 9th Symp. on the Integration of Symbolic Computation and Mechanized Reasoning, 2001. ,
Formal Specification and Validation of Security Policies, Foundations & Practice of Security, pp.148-163, 2011. ,
DOI : 10.1007/978-3-642-27901-0_12
URL : https://hal.archives-ouvertes.fr/inria-00507300
A Brief Overview of Agda ??? A Functional Language with Dependent Types, Theorem Proving in Higher Order Logics, 22nd Int. Conf., TPHOLs 2009, Proceedings, pp.73-78, 2009. ,
DOI : 10.1007/978-3-540-87827-8_28
Functional Testing in the Focal Environment, Tests and Proofs, Second Int. Conf., TAP 2008, Proceedings, pp.84-98, 2008. ,
DOI : 10.1007/978-3-540-79124-9_7
URL : https://hal.archives-ouvertes.fr/hal-01125411
Constraint reasoning in FocalTest, ICSOFT 2010 -Proceedings of the Fifth Int. Conf. on Software and Data Technologies, pp.82-91, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00699233
The Coq Proof Assistant, Tutorial and reference manual Distribution available at, 2010. ,
Certifying Airport Security Regulations Using the Focal Environment, FM 2006: 14th Int. Symp. on Formal Methods, pp.48-63, 2006. ,
DOI : 10.1007/11813040_4
URL : https://hal.archives-ouvertes.fr/hal-01125368
Génération de code fonctionnel certifiécertifié`certifiéà partir de spécifications inductives dans l'environnement Focalize, 21th Journées Francophones des Langages Applicatifs, 2010. ,
Tutorial and reference manual Distribution available at, p.6, 2010. ,
Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976. ,
DOI : 10.1145/360303.360333
Security Rules versus Security Properties, Information Systems Security -6th Int. Conf., ICISS, pp.231-245, 2010. ,
DOI : 10.1007/978-3-642-17714-9_17
URL : https://hal.archives-ouvertes.fr/hal-00593937
Flow Based Interpretation of Access Control: Detection of Illegal Information Flows, Information Systems Security -7th Int. Conf., ICISS, pp.72-86, 2011. ,
DOI : 10.1007/978-3-540-39650-5_17
URL : https://hal.archives-ouvertes.fr/hal-00647170
How to write a proof AMM: The American Mathematical Monthly, pp.600-608, 1995. ,
The Objective Caml system, Documentation and user's manual , release 3, 2003. ,
Algorithms and proof inheritance in the Foc language, Journal of Automated Reasoning, vol.29, issue.3/4, pp.337-363, 2002. ,
DOI : 10.1023/A:1021979218446
Making proofs in a hierarchy of mathematical structures, 11th Symp. on the Integration of Symbolic Computation and Mechanized Reasoning, pp.89-100, 2003. ,
Invariants for the FoCaL language, Annals of Mathematics and Artificial Intelligence, vol.29, issue.3???4, pp.273-296, 2009. ,
DOI : 10.1007/s10472-009-9156-3
Security policy enforcement through refinement process Formal Specification and Development in B, 7th Int. Conf. of B Users, LNCS, vol.4355, pp.216-231, 2007. ,