M. Abadi, Secrecy by typing in security protocols, Theoretical Aspects of Computer Software '97, pp.611-638, 1997.
DOI : 10.1007/BFb0014571

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.8514

M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke, A core calculus of dependency, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.147-160, 1999.
DOI : 10.1145/292540.292555

M. Abadi and A. D. Gordon, Reasoning about cryptographic protocols in the spi calculus, CONCUR'97: Concurrency Theory, pp.59-73, 1997.
DOI : 10.1007/3-540-63141-0_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.8326

D. S. Alexander, W. A. Arbaugh, M. W. Hicks, P. Kakkar, A. D. Keromytis et al., The SwitchWare active network architecture, IEEE Network, vol.12, issue.3, pp.29-36, 1998.
DOI : 10.1109/65.690959

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.5304

D. S. Alexander, W. A. Arbaugh, A. D. Keromytis, and J. M. Smith, Security in Active Networks, Secure Internet Programming, 1999.
DOI : 10.1007/3-540-48749-2_20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.6837

J. Banâtre and C. Bryce, A security proof system for networks of communicating processes, 1993.

J. Billon, Security breaches in the JDK 1.1 beta2 security API. Dyade, 1997.

N. S. Borenstein, Email with a mind of its own: the Safe-Tcl language for enabled mail, IFIP International Working Conference on Upper Layer Protocols, Architectures and Applications, 1994.

V. Breazu-tannen, T. Coquand, C. A. Gunter, and A. Scedrov, Inheritance as implicit coercion, Information and Computation, vol.93, issue.1, pp.172-221, 1991.
DOI : 10.1016/0890-5401(91)90055-7

URL : http://doi.org/10.1016/0890-5401(91)90055-7

K. Brunnstein, Hostile ActiveX control demonstrated, RISKS Forum, vol.18, issue.82, 1997.

L. Cardelli, S. Martini, J. C. Mitchell, and A. Scedrov, An Extension of System F with Subtyping, Information and Computation, vol.109, issue.1-2, pp.4-56, 1994.
DOI : 10.1006/inco.1994.1013

D. Dean, E. W. Felten, D. S. Wallach, and D. Balfanz, Java security: Web browsers and beyond, Internet Besieged: Countering Cyberspace Scofflaws, pp.241-269, 1997.

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-242, 1976.
DOI : 10.1145/360051.360056

D. E. Denning and P. J. Denning, Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977.
DOI : 10.1145/359636.359712

S. Drossopoulou and S. Eisenbach, Java is type safe ??? Probably, Proc. 11th European Conference on Object Oriented Programming, pp.389-418, 1997.
DOI : 10.1007/BFb0053388

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.352.5159

M. Erdos, B. Hartman, and M. Mueller, Security reference model for the Java Developer's Kit 1.0.2, JavaSoft, 1996.

S. N. Freund and J. C. Mitchell, A type system for object initialization in the Java bytecode language, Object-Oriented Programming Systems, pp.310-327, 1998.

L. Gong, Java security architecture (JDK1.2) JavaSoft, http://java.sun.com/ products/jdk/1.2/docs/guide/security/spec/security-spec.doc.html, 1998.
DOI : 10.1145/2030256.2034639

J. Gosling and H. Mcgilton, The Java language environment ? a white paper, JavaSoft, 1996.

N. Heintze and J. G. Riecke, The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.365-377, 1998.
DOI : 10.1145/268946.268976

D. Hopwood, Java security bug (applets can load native methods), RISKS Forum, vol.17, issue.83, 1996.

T. Jensen, D. L. Métayer, and T. Thorn, Security and dynamic class loading in Java: a formalisation, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225), pp.4-15, 1998.
DOI : 10.1109/ICCL.1998.674152

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.303

X. Leroy, Polymorphic typing of an algorithmic language, 1992.
URL : https://hal.archives-ouvertes.fr/inria-00077018

X. Leroy, J. Vouillon, and D. Doligez, The Objective Caml system. Software and documentation available on the Web, 1996.

R. Milner, M. Tofte, R. Harper, and D. Macqueen, The definition of Standard ML (revised), 1997.

G. Morrisett, M. Felleisen, and R. Harper, Abstract models of memory management, Proceedings of the seventh international conference on Functional programming languages and computer architecture , FPCA '95, pp.66-77, 1995.
DOI : 10.1145/224164.224182

G. C. Necula, Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.106-119, 1997.
DOI : 10.1145/263699.263712

G. C. Necula and P. Lee, Safe kernel extensions without run-time checking, Proc. Symp. Operating Systems Design and Implementation, pp.229-243, 1996.
DOI : 10.1145/248155.238781

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.6054

T. Nipkow and D. Oheimb, is type-safe---definitely, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.161-170, 1998.
DOI : 10.1145/268946.268960

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.2452

J. Palsberg and P. O. Keefe, A type system equivalent to flow analysis, ACM Transactions on Programming Languages and Systems, vol.17, issue.4, pp.576-599, 1995.
DOI : 10.1145/210184.210187

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.3559

J. Palsberg and P. Ørbaek, Trust in the ??-calculus, Journal of Functional Programming, vol.7, issue.6, pp.557-591, 1997.
DOI : 10.1007/3-540-60360-3_47

G. D. Plotkin, A structural approach to operational semantics, 1981.

Z. Qian, A formal specification of a large subset of Java Virtual Machine instructions, Formal Syntax and Semantics of Java, 1998.

J. C. Reynolds, User-Defined Types and Procedural Data Structures as Complementary Approaches to Data Abstraction, Theoretical aspects of object-oriented programming, pp.13-23, 1994.
DOI : 10.1007/978-1-4612-6315-9_22

F. Rouaix, A Web navigator with applets in Caml, Proceedings of the 5th International World Wide Web Conference, pp.1365-1371, 1996.
DOI : 10.1016/0169-7552(96)00032-3

R. Stata and M. Abadi, A type system for Java bytecode subroutines, 25th symposium Principles of Programming Languages, pp.149-160, 1998.
DOI : 10.1145/268946.268959

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.152.2904

D. Syme, Proving Java Type Soundness, 1997.
DOI : 10.1007/3-540-48737-9_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.622

J. Talpin and P. Jouvelot, The Type and Effect Discipline, Information and Computation, vol.111, issue.2, pp.245-296, 1994.
DOI : 10.1006/inco.1994.1046

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.54.5309

M. Tofte, Type inference for polymorphic references. Information and Computation, 1990.
DOI : 10.1016/0890-5401(90)90018-d

URL : http://doi.org/10.1016/0890-5401(90)90018-d

D. Volpano and G. Smith, A type-based approach to program security, Proceedings of TAPSOFT'97, Colloquium on Formal Approaches in Software Engineering, pp.607-621, 1997.
DOI : 10.1007/BFb0030629

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.152.7398

D. Volpano, G. Smith, and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.1-21, 1996.
DOI : 10.3233/JCS-1996-42-304

URL : http://doi.org/10.3233/jcs-1996-42-304

D. S. Wallach, D. Balfanz, D. Dean, and E. W. Felten, Extensible security architectures for Java, 1997.
DOI : 10.1145/268998.266668

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.9172

D. S. Wallach and E. W. Felten, Understanding Java stack inspection, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), 1998.
DOI : 10.1109/SECPRI.1998.674823

F. Yellin, Low level security in Java, Proceedings of the Fourth International World Wide Web Conference, pp.369-379, 1995.