M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke, A core calculus of dependency, Proceedings of the 26th ACM Symposium on Principles of Programming Languages (POPL 99), pp.147-160, 1999.

M. Abadi and L. Cardelli, A Theory of Objects, 1996.

A. Ahmed, Semantics of Types for Mutable State, 2004.

A. Ahmed, Step-indexed syntactic logical relations for recursive and quantified types, Proceedings of the 15th European Symposium on Programming, vol.3924, pp.69-83, 2006.

M. Roberto, L. Amadio, and . Cardelli, Subtyping recursive types, Conference Record of the Eighteenth Annual ACM Symposium on Principles of Programming Languages (POPL 91), pp.104-118, 1991.

A. W. Appel and D. Mcallester, An indexed model of recursive types for foundational proof-carrying code, ACM Transactions on Programming Languages and Systems, vol.23, issue.5, pp.657-683, 2001.

A. Askarov and A. Sabelfeld, Gradual release: Unifying declassification, encryption and key release policies, Proceedings of the 27th IEEE Symposium on Security and Privacy (S&P 2007), pp.207-221, 2007.

H. Thomas, C. Austin, and . Flanagan, Multiple facets for dynamic information flow, Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2012), pp.165-178, 2012.

A. Banerjee and D. A. Naumann, Stack-based access control and secure information flow, Journal of Functional Programmming, vol.15, issue.2, pp.131-177, 2005.

A. Banerjee, D. A. Naumann, and S. Rosenberg, Expressive declassification policies and modular static enforcement, Proceedings of the IEEE Symposium on Security and Privacy (S&P 2008), pp.339-353, 2008.

G. Barthe, S. Cavadini, and T. Rezk, Tractable enforcement of declassification policies, Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pp.83-97, 2008.

N. Bielova and T. Rezk, Spot the difference: Secure multi-execution and multiple facets, Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS 2016), pp.501-519, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01348192

I. Bolosteanu and D. Garg, Asymmetric secure multi-execution with declassification, Proceedings of the 5th International Conference on Principles of Security and Trust (POST 2016), pp.24-45, 2016.

J. William, A. Bowman, and . Ahmed, Noninterference for free, Proceedings of the 20th ACM SIGPLAN Conference on Functional Programming (ICFP 2015), pp.101-113, 2015.

N. Broberg and D. Sands, Paralocks: role-based information flow control and beyond, Proceedings of the 37th annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2010), pp.431-444, 2010.

, Type Abstraction for Relaxed Noninterference

S. Chong and A. C. Myers, End-to-end enforcement of erasure and declassification, Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pp.98-111, 2008.

W. R. Cook, On understanding data abstraction, revisited, ACM SIGPLAN Notices, vol.44, issue.10, pp.557-572, 2009.

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.

D. Devriese and F. Piessens, Noninterference through Secure Multi-execution, Proceedings of the 31st IEEE Symposium on Security and Privacy (S&P 2010), pp.109-124, 2010.

C. Fournet, J. Planul, and T. Rezk, Information-flow types for homomorphic encryptions, Proceedings of the Conference on Computer and Communications Security (CCS 2011), pp.351-360, 2011.

B. Hicks, D. King, P. Mcdaniel, and M. Hicks, Trusted declassification: high-level policy for a security-typed language, Proceedings of the workshop on Programming Languages and Analysis for Security (PLAS 2006), pp.65-74, 2006.

P. Li and S. Zdancewic, Downgrading policies and relaxed noninterference, Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2005), pp.158-170, 2005.

A. A. Matos and G. Boudol, On declassification and the non-disclosure policy, Proceedings of the IEEE Computer Security Foundations Workshop (CSFW 2005), pp.549-597, 2005.

A. C. Myers, Jif homepage, 2017.

C. Andrew, B. Myers, and . Liskov, Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, pp.410-442, 2000.

C. Benjamin and . Pierce, Types and programming languages, 2002.

W. Rafnsson and A. Sabelfeld, Secure multi-execution: Fine-grained, declassification-aware, and transparent, Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013), pp.33-48, 2013.

T. Rompf and N. Amin, Type soundness for dependent object types (DOT), Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2016), pp.624-641, 2016.

A. Sabelfeld and D. Sands, Declassification: Dimensions and principles, Journal of Computer Security, vol.17, issue.5, pp.517-548, 2009.

N. Shikuma and A. Igarashi, Proving noninterference by a fully complete translation to the simply typed lambda-calculus, Proceedings of the 11th Asian Computing Science Conference (ASIAN 2006), vol.4435, pp.301-315, 2006.

N. Swamy and M. Hicks, Verified enforcement of stateful information release policies, Proceedings of the Workshop on Programming Languages and Analysis for Security (PLAS 2008), pp.21-32, 2008.

S. Tse and S. Zdancewic, Translating dependency into parametricity, Proceedings of the 7th ACM SIGPLAN Conference on Functional Programming (ICFP 2004), pp.115-125, 2004.

R. Cruz, T. Rezk, B. Serpette, and É. Tanter, , vol.7, p.23

S. Tse and S. Zdancewic, A design for a security-typed language with certificatebased declassification, Proceedings of the 14th European Symposium on Programming Languages and Systems (ESOP 2005, vol.2986, pp.279-294, 2005.

M. Vanhoef, W. D. Groef, D. Devriese, F. Piessens, and T. Rezk, Stateful declassification policies for event-driven programs, Proceedings of the 27th IEEE Computer Security Foundations Symposium, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01098443

N. Vazou, E. L. Seidel, R. Jhala, D. Vytiniotis, and S. , Refinement types for haskell, Proceedings of the 19th ACM SIGPLAN Conference on Functional Programming (ICFP 2014), pp.269-282, 2014.

D. Volpano, C. Irvine, and G. Smith, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.

G. Washburn and S. Weirich, Generalizing parametricity using informationflow, Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), pp.62-71, 2005.

S. Zdancewic, Programming Languages for Information Security, 2002.

S. Zdancewic, Challenges for information-flow security, Proceedings of Programming Language Interference and Dependence, 2004.

S. Zdancewic and A. C. Myers, Robust declassification, Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14), pp.15-23, 2001.