A core calculus of dependency, Proceedings of the 26th ACM Symposium on Principles of Programming Languages (POPL 99), pp.147-160, 1999. ,
A Theory of Objects, 1996. ,
Semantics of Types for Mutable State, 2004. ,
Step-indexed syntactic logical relations for recursive and quantified types, Proceedings of the 15th European Symposium on Programming, vol.3924, pp.69-83, 2006. ,
Subtyping recursive types, Conference Record of the Eighteenth Annual ACM Symposium on Principles of Programming Languages (POPL 91), pp.104-118, 1991. ,
An indexed model of recursive types for foundational proof-carrying code, ACM Transactions on Programming Languages and Systems, vol.23, issue.5, pp.657-683, 2001. ,
Gradual release: Unifying declassification, encryption and key release policies, Proceedings of the 27th IEEE Symposium on Security and Privacy (S&P 2007), pp.207-221, 2007. ,
Multiple facets for dynamic information flow, Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2012), pp.165-178, 2012. ,
Stack-based access control and secure information flow, Journal of Functional Programmming, vol.15, issue.2, pp.131-177, 2005. ,
Expressive declassification policies and modular static enforcement, Proceedings of the IEEE Symposium on Security and Privacy (S&P 2008), pp.339-353, 2008. ,
Tractable enforcement of declassification policies, Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pp.83-97, 2008. ,
Spot the difference: Secure multi-execution and multiple facets, Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS 2016), pp.501-519, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01348192
Asymmetric secure multi-execution with declassification, Proceedings of the 5th International Conference on Principles of Security and Trust (POST 2016), pp.24-45, 2016. ,
Noninterference for free, Proceedings of the 20th ACM SIGPLAN Conference on Functional Programming (ICFP 2015), pp.101-113, 2015. ,
Paralocks: role-based information flow control and beyond, Proceedings of the 37th annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2010), pp.431-444, 2010. ,
, Type Abstraction for Relaxed Noninterference
End-to-end enforcement of erasure and declassification, Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pp.98-111, 2008. ,
On understanding data abstraction, revisited, ACM SIGPLAN Notices, vol.44, issue.10, pp.557-572, 2009. ,
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
Noninterference through Secure Multi-execution, Proceedings of the 31st IEEE Symposium on Security and Privacy (S&P 2010), pp.109-124, 2010. ,
Information-flow types for homomorphic encryptions, Proceedings of the Conference on Computer and Communications Security (CCS 2011), pp.351-360, 2011. ,
Trusted declassification: high-level policy for a security-typed language, Proceedings of the workshop on Programming Languages and Analysis for Security (PLAS 2006), pp.65-74, 2006. ,
Downgrading policies and relaxed noninterference, Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2005), pp.158-170, 2005. ,
On declassification and the non-disclosure policy, Proceedings of the IEEE Computer Security Foundations Workshop (CSFW 2005), pp.549-597, 2005. ,
Jif homepage, 2017. ,
Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, pp.410-442, 2000. ,
Types and programming languages, 2002. ,
Secure multi-execution: Fine-grained, declassification-aware, and transparent, Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013), pp.33-48, 2013. ,
Type soundness for dependent object types (DOT), Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2016), pp.624-641, 2016. ,
Declassification: Dimensions and principles, Journal of Computer Security, vol.17, issue.5, pp.517-548, 2009. ,
Proving noninterference by a fully complete translation to the simply typed lambda-calculus, Proceedings of the 11th Asian Computing Science Conference (ASIAN 2006), vol.4435, pp.301-315, 2006. ,
Verified enforcement of stateful information release policies, Proceedings of the Workshop on Programming Languages and Analysis for Security (PLAS 2008), pp.21-32, 2008. ,
Translating dependency into parametricity, Proceedings of the 7th ACM SIGPLAN Conference on Functional Programming (ICFP 2004), pp.115-125, 2004. ,
, , vol.7, p.23
A design for a security-typed language with certificatebased declassification, Proceedings of the 14th European Symposium on Programming Languages and Systems (ESOP 2005, vol.2986, pp.279-294, 2005. ,
Stateful declassification policies for event-driven programs, Proceedings of the 27th IEEE Computer Security Foundations Symposium, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01098443
Refinement types for haskell, Proceedings of the 19th ACM SIGPLAN Conference on Functional Programming (ICFP 2014), pp.269-282, 2014. ,
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
Generalizing parametricity using informationflow, Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), pp.62-71, 2005. ,
Programming Languages for Information Security, 2002. ,
Challenges for information-flow security, Proceedings of Programming Language Interference and Dependence, 2004. ,
Robust declassification, Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14), pp.15-23, 2001. ,