E. Badouel, M. Bednarczyk, A. Borzyszkowski, B. Caillaud, and P. Darondeau, Concurrent secrets. Discrete Event Dynamic Systems, pp.425-446, 2008.
DOI : 10.1109/wodes.2006.1678407

URL : https://hal.archives-ouvertes.fr/inria-00070249

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.331-340, 2005.
DOI : 10.1109/LICS.2005.8

W. Jeremy, M. Bryans, L. Koutny, P. Y. Mazaré, and . Ryan, Opacity generalised to transition systems, International Journal of Information Security, vol.7, issue.6, pp.421-435, 2008.

C. Cassandras and S. Lafortune, Introduction to Discrete Event Systems, 1999.

F. Cassez, O. Mullins, and . Roux, Synthesis of Non-interferent Distributed Systems, 4th Int. Conf. on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS'07), 2007.
DOI : 10.1007/978-3-540-73986-9_14

V. Darmaillacq, J. Fernandez, R. Groz, L. Mounier, and J. Richier, Test Generation for Network Security Rules, LNCS, vol.3964, 2006.
DOI : 10.1007/11754008_22

J. Dubreil, . Ph, H. Darondeau, and . Marchand, Opacity enforcing control synthesis, 2008 9th International Workshop on Discrete Event Systems, 2008.
DOI : 10.1109/WODES.2008.4605918

URL : https://hal.archives-ouvertes.fr/inria-00344269

J. Dubreil, T. Jéron, and H. Marchand, Monitoring information flow by diagnosis techniques, 1901.
URL : https://hal.archives-ouvertes.fr/inria-00312747

R. Focardi and R. Gorrieri, Classification of security properties: Information flow, Foundations of Security Analysis and Design, pp.331-396, 2000.

N. Hadj-alouane, S. Lafrance, F. Lin, J. Mullins, and M. Yeddes, On the Verification of Intransitive Noninterference in Mulitlevel Security, IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics), vol.35, issue.5, pp.948-957, 2005.
DOI : 10.1109/TSMCB.2005.847749

G. and L. Guernic, Information flow testing -the third path towards confidentiality guarantee, Advances in Computer Science ? ASIAN 2007. Computer and Network Security, pp.33-47, 2007.

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005.
DOI : 10.1007/s10207-004-0046-8

G. Lowe, Towards a completeness result for model checking of security protocols, Journal of Computer Security, vol.7, issue.2-3, pp.89-146, 1999.
DOI : 10.3233/JCS-1999-72-302

L. Mazaré, Using unification for opacity properties, Proceedings of the 4th IFIP WG1.7 Workshop on Issues in the Theory of Security, pp.165-176, 2004.

P. J. Ramadge and W. M. Wonham, Supervisory Control of a Class of Discrete Event Processes, SIAM Journal on Control and Optimization, vol.25, issue.1, pp.206-230, 1987.
DOI : 10.1137/0325013

P. J. Ramadge and W. M. Wonham, The control of discrete event systems, Proceedings of the IEEE, vol.77, issue.1, pp.81-98, 1989.
DOI : 10.1109/5.21072

L. Ricker, A Question of Access: Decentralized Control and Communication Strategies for Security Policies, 2006 8th International Workshop on Discrete Event Systems, pp.58-63, 2006.
DOI : 10.1109/WODES.2006.1678408

A. Saboori and C. Hadjicostis, Verification of initial-state opacity in security applications of DES, 2008 9th International Workshop on Discrete Event Systems, p.6, 2008.
DOI : 10.1109/WODES.2008.4605967

A. Saboori and C. Hadjicostis, Notions of security and opacity in discrete event systems, 2007 46th IEEE Conference on Decision and Control, pp.5056-5061, 2007.
DOI : 10.1109/CDC.2007.4434515

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853

S. Schneider and A. Sidiropoulos, CSP and anonymity, Computer Security ? ESORICS 96, pp.198-218, 1146.
DOI : 10.1007/3-540-61770-1_38

S. Takai and Y. Oka, A Formula for the Supremal Controllable and Opaque Sublanguage Arising in Supervisory Control, SICE Journal of Control, Measurement, and System Integration, vol.1, issue.4, pp.307-312, 2008.
DOI : 10.9746/jcmsi.1.307