Major publications by the team in recent years
  • 1G. Barthe, T. Rezk, A. Russo, A. Sabelfeld.

    Security of Multithreaded Programs by Compilation, in: ESORICS, 2007, p. 2-18.
  • 2G. Boudol, I. Castellani.

    Noninterference for Concurrent Programs and Thread Systems, in: Theoretical Computer Science, 2002, vol. 281, no 1, p. 109-130.
  • 3C. Fournet, T. Rezk.

    Cryptographically sound implementations for typed information-flow security, in: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, 2008, p. 323-335.
  • 4M. Serrano, E. Gallesio, F. Loitsch.

    HOP, a language for programming the Web 2.0, in: Proceedings of the First Dynamic Languages Symposium, Portland, Oregon, USA, October 2006.
  • 5M. Serrano.

    Bee: an Integrated Development Environment for the Scheme Programming Language, in: Journal of Functional Programming, May 2000, vol. 10, no 2, p. 1–43.
Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 6Z. Luo.

    Semantics and Security of Web Applications, Université Nice Sophia Antipolis, Oct 2011.

Articles in Non Peer-Reviewed Journal

  • 7G. Barthe, P. D'Argenio, T. Rezk.

    Secure Information Flow by Self Composition, in: Journal of Mathematical Structures in Computer Science, 2011, no 21, p. 1207-1252.
  • 8G. Barthe, D. Pichardie, T. Rezk.

    A Certified Lightweight Non-Interference Java Bytecode Verifier, in: Journal of Mathematical Structures in Computer Science, 2012.

International Conferences with Proceedings

  • 9G. Berry, C. Nicolas, M. Serrano.

    HipHop: A Synchronous Reactive Extension for Hop, in: Proceedings of the PLASTIC'11 workshop, Portland, USA, Oct 2011.
  • 10V. Bono, S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.

    A Reputation System for Multirole Sessions, in: TGC, Lecture Notes in Computer Science, Springer, 2011.
  • 11S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.

    Information Flow Safety in Multiparty Sessions, in: EXPRESS'11, EPTCS, 2011, vol. 64, p. 16–30.

  • 12C. Fournet, J. Planul, T. Rezk.

    Information-flow types for homomorphic encryptions, in: ACM Conference on Computer and Communications Security, 2011.
  • 13Z. Luo, T. Rezk, M. Serrano.

    Automated Code Injection Prevention for Web Applications, in: Proceedings of the first Conference on Theory of Security and Applications (TOSCA'11), Saarbrücken, Germany, Lecture Notes on Computer Science, Apr 2011, vol. 6993, p. 186–204.
  • 14B. Serpette, M. Serrano.

    An Interpreter for Server-Side Hop, in: Proceedings of the DLS'11 symposium, Portland, USA, Oct 2011.

National Conferences with Proceeding

  • 15P. Attar, F. Boussinot.

    Orchestration synchrone et au-delà, in: Actes de la conférence Modélisation des Systèmes Réactifs (MSR'11), Hermes, 2011, vol. 45, p. 77-92.
  • 16E. Chailloux, B. Serpette.

    Séparation des couleurs dans un lambda-calcul bichrome, in: Actes des journées JFLA, Carnac, France, 2012.

Conferences without Proceedings

  • 17M. Serrano.

    HopTeX - Compiling HTML to LaTeX with CSS, in: Online Proceedings of the Scheme'11 workshop, Portland, USA, Oct 2011.

Internal Reports