EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1G. Barthe, T. Rezk, A. Russo, A. Sabelfeld.

    Security of Multithreaded Programs by Compilation, in: ESORICS, 2007, p. 2-18.
  • 2G. Boudol, I. Castellani.

    Noninterference for Concurrent Programs and Thread Systems, in: Theoretical Computer Science, 2002, vol. 281, no 1, p. 109-130.
  • 3C. Fournet, T. Rezk.

    Cryptographically sound implementations for typed information-flow security, in: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, 2008, p. 323-335.
  • 4M. Serrano, E. Gallesio, F. Loitsch.

    HOP, a language for programming the Web 2.0, in: Proceedings of the First Dynamic Languages Symposium, Portland, Oregon, USA, October 2006.
  • 5M. Serrano.

    Bee: an Integrated Development Environment for the Scheme Programming Language, in: Journal of Functional Programming, May 2000, vol. 10, no 2, p. 1–43.
Publications of the year

Articles in International Peer-Reviewed Journals

  • 6G. Barthe, D. Pichardie, T. Rezk.

    A Certified Lightweight Non-Interference Java Bytecode Verifier, in: Mathematical Structures in Computer Science, 2012, to appear.
  • 7G. Boudol, Z. Luo, T. Rezk, M. Serrano.

    Reasoning about Web Applications: An Operational Semantics for HOP, in: ACM Transactions on Programming Languages and Systems, 2012, vol. 34, no 2.
  • 8S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.

    Typing Access Control and Secure Information Flow in Sessions, in: Information and Computation, special issue on Security and Rewriting Techniques, 2012, to appear.
  • 9M. Mendler, T. Shiple, G. Berry.

    Constructive Boolean Circuits and the Exactness of Timed Ternary Simulation, in: Formal Methods for Systems Design, 2012, no 3, p. 283–329.
  • 10M. Serrano, C. Queinnec.

    A multi-tier semantics for Hop, in: Higher Order and Symbolic Computation (HOSC), 2012, vol. 23, no 4, p. 409-431.

Articles in Non Peer-Reviewed Journals

  • 11G. Barthe, D. Pichardie, T. Rezk.

    A Certified Lightweight Non-Interference Java Bytecode Verifier, in: Journal of Mathematical Structures in Computer Science, 2012.

International Conferences with Proceedings

  • 12A. Almeida-Matos, J. Fragoso Santos.

    Typing Illegal Information Flow as Program Effects, in: Proceedings of the 7th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, 2012.
  • 13G. Boudol, G. Petri, B. Serpette.

    Relaxed Operational Semantics of Concurrent Programming Languages, in: Expressiveness in Concurrency/Structural Operational Semantics (EXPRESS/SOS), EPTCS, 2012, vol. 89, p. 19-33.
  • 14Z. Luo, T. Rezk.

    The Mashic Compiler: Mashup Sandboxing using Inter-frame Communication, in: Computer Security Foundations (CSF), 2012.

National Conferences with Proceeding

  • 15E. Chailloux, B. Serpette.

    Séparation des couleurs dans un lambda-calcul bichrome, in: Actes des journées JFLA, Carnac, France, 2012.

Scientific Popularization