?. , ?. Ke-refl, S. , ?. Ke-prod, S. ;. et al., F size Fine size A+, Benchmark A+ A- Pf+ Pf-Pf+ Pf+

J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, and S. Maffeis, Refinement types for secure implementations, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01294973

Y. Bertot and P. Castéran, Coq'art: Interactive theorem proving and program development, 2004.
URL : https://hal.archives-ouvertes.fr/hal-00344237

K. Bhargavan, C. Fournet, and A. D. Gordon, Modular verification of security protocol code by typing, 2010.

. Bhargavan, . Karthikeyan, . Corin, . Ricardo, . Dénielou et al., Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, 2009.
DOI : 10.1109/CSF.2009.26

J. Borgstrom, J. Chen, and . Swamy, Verifying stateful programs with substructural state and hoare types, Proceedings of the 5th ACM workshop on Programming languages meets program verification, PLPV '11, 2011.
DOI : 10.1145/1929529.1929532

I. Cervesato and F. Pfenning, A linear logical framework, Inf. comput, vol.179, issue.1, 2002.

P. C. Chapin, . Skalka, . Christian, X. Wang, and . Sean, Authorization in trust management, ACM Computing Surveys, vol.40, issue.3, 2008.
DOI : 10.1145/1380584.1380587

J. Chen, R. Chugh, . Swamy, and . Nikhil, Type-preserving compilation of endto-end verification of security enforcement, 2010.

. De-moura, . Leonardo, . Bjørner, and . Nikolaj, Z3: An Efficient SMT Solver, Tacas, 2008.
DOI : 10.1007/978-3-540-78800-3_24

P. Deniélou and N. Yoshida, Dynamic multirole session types, 2011.

M. Felleisen and R. Hieb, The revised report on the syntactic theories of sequential control and state, Theoretical Computer Science, vol.103, issue.2, pp.235-271, 1992.
DOI : 10.1016/0304-3975(92)90014-7

C. Fournet, A. D. Gordon, and S. Maffeis, A type discipline for authorization policies in distributed systems, Pages 31?45 of: 20th ieee computer security foundations symposium (csf'07), 2007.

C. Fournet, . Kohlweiss, . Markulf, . Strub, and . Pierre-yves, Modular codebased cryptographic verification, Pages 341?350 of: Acm conference on computer and communications security, 2011.
DOI : 10.1145/2046707.2046746

URL : https://hal.archives-ouvertes.fr/inria-00614372

C. Fournet, . Swamy, . Nikhil, . Chen, . Juan et al., Fully abstract compilation to javascript, proceedings of the acm symposium on principles of programming languages (popl), 2013.
URL : https://hal.archives-ouvertes.fr/hal-00780803

C. Fournet, . Swamy, . Nikhil, . Chen, . Juan et al., Fully abstract compilation to javascript, proceedings of the acm symposium on principles of programming languages (popl), 2013.
URL : https://hal.archives-ouvertes.fr/hal-00780803

A. D. Gordon and A. Jeffrey, Authenticity by typing for security protocols, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.451-520, 2003.
DOI : 10.1109/CSFW.2001.930143

. Guha, . Arjun, . Saftoiu, . Claudiu, . Krishnamurthi et al., The Essence of JavaScript, 2010.
DOI : 10.1007/978-3-642-14107-2_7

. Guha, . Arjun, . Fredrikson, . Matthew, . Livshits et al., Verified Security for Browser Extensions, 2011 IEEE Symposium on Security and Privacy, 2011.
DOI : 10.1109/SP.2011.36

Y. Gurevich, . Neeman, and . Itay, Dkal: Distributed-knowledge authorization language. Pages 149?162 of: Csf, 2008.

. Guts, . Nataliya, . Fournet, . Cédric, F. Nardelli et al., Reliable Evidence: Auditability by Typing, Esorics, vol.25, issue.17, 2009.
DOI : 10.1016/S0140-3664(02)00049-X

K. Honda, . Yoshida, . Nobuko, and M. Carbone, Multiparty asynchronous session types, 2008.

J. Jeannin, . De-caso, . Guido, . Chen, . Juan et al., dkal ?????????: Constructing Executable Specifications of Authorization Protocols, proceedings of the international symposium on engineering secure software and systems, 2013.
DOI : 10.1007/978-3-642-36563-8_10

L. Jia and S. Zdancewic, Encoding information flow in aura, 2009.

. Jia, . Limin, . Vaughan, . Jeffrey, . Mazurak et al., Aura: A programming language for authorization and audit, 2008.

. Kimmell, . Garrin, . Stump, . Aaron, I. Eades et al., Equational reasoning about programs with general recursion and call-byvalue semantics. Pages 15?26 of: Proceedings of the sixth workshop on programming languages meets program verification, 2012.

O. Kiselyov, S. Jones, . Peyton, and C. Chieh-shan, Fun with Type Functions, 2010.
DOI : 10.1007/978-1-84882-912-1_14

S. K. Lahiri, . Qadeer, . Shaz, and D. Walker, Linear maps. PLPV '11, 2011.

J. Mccarthy, Towards a Mathematical Science of Computation, 1962.
DOI : 10.1007/978-94-011-1793-7_2

A. Nanevski, . Morrisett, . Greg, . Shinnar, . Avraham et al., Ynot: dependent types for imperative programs, 2008.

U. Norell, Towards a practical programming language based on dependent type theory, 2007.

A. Rial and G. Danezis, 2010 (nov) Privacy-friendly smart metering

C. Schlesinger, . Swamy, and . Nikhil, Verification condition generation with the dijkstra state monad, 2012.

P. Sewell, Z. Nardelli, . Francesco, . Owens, . Scott et al., Ott: Effective tool support for the working semanticist, Jfp, vol.20, issue.1, 2010.

P. Strub, . Swamy, . Nikhil, C. Fournet, and J. Chen, Selfcertification: Bootstrapping certified typechecekrs in f* with coq, proceedings of the acm symposium on principles of programming languages, 2012.

. Swamy, . Nikhil, B. J. Corcoran, and M. Hicks, Fable: A Language for Enforcing User-defined Security Policies, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.29

. Swamy, . Nikhil, J. Chen, and R. Chugh, Enforcing Stateful Authorization and Information Flow Policies in Fine, 2010.
DOI : 10.1007/978-3-642-11957-6_28

. Swamy, . Nikhil, . Chen, . Juan, . Fournet et al., Secure distributed programming with value-dependent types. Pages 266?278 of: Chakravarty, Manuel M, Icfp, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00939188

D. Volpano, . Smith, . Geoffrey, and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.
DOI : 10.3233/JCS-1996-42-304