The Inria's Research Teams produce an annual Activity Report presenting their activities and their results of the year. These reports include the team members, the scientific program, the software developed by the team and the new results of the year. The report also describes the grants, contracts and the activities of dissemination and teaching. Finally, the report gives the list of publications of the year.
1G. Barthe, T. Rezk, A. Russo, A. Sabelfeld. Security of Multithreaded Programs by Compilation, in: ESORICS, 2007, p. 2-18.
2G. Boudol, I. Castellani. Noninterference for Concurrent Programs and Thread Systems, in: Theoretical Computer Science, 2002, vol. 281, no 1, p. 109-130.
3C. Fournet, T. Rezk. Cryptographically sound implementations for typed information-flow security, in: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, 2008, p. 323-335.
4M. Serrano, E. Gallesio, F. Loitsch. HOP, a language for programming the Web 2.0, in: Proceedings of the First Dynamic Languages Symposium, Portland, Oregon, USA, October 2006.
5M. Serrano. Bee: an Integrated Development Environment for the Scheme Programming Language, in: Journal of Functional Programming, May 2000, vol. 10, no 2, p. 1–43.
6G. Barthe, D. Pichardie, T. Rezk. A Certified Lightweight Non-Interference Java Bytecode Verifier, in: Mathematical Structures in Computer Science, 2012, to appear.
7G. Boudol, Z. Luo, T. Rezk, M. Serrano. Reasoning about Web Applications: An Operational Semantics for HOP, in: ACM Transactions on Programming Languages and Systems, 2012, vol. 34, no 2.
8S. Capecchi, I. Castellani, M. Dezani-Ciancaglini. Typing Access Control and Secure Information Flow in Sessions, in: Information and Computation, special issue on Security and Rewriting Techniques, 2012, to appear.
9M. Mendler, T. Shiple, G. Berry. Constructive Boolean Circuits and the Exactness of Timed Ternary Simulation, in: Formal Methods for Systems Design, 2012, no 3, p. 283–329.
10M. Serrano, C. Queinnec. A multi-tier semantics for Hop, in: Higher Order and Symbolic Computation (HOSC), 2012, vol. 23, no 4, p. 409-431.
Articles in Non Peer-Reviewed Journals
11G. Barthe, D. Pichardie, T. Rezk. A Certified Lightweight Non-Interference Java Bytecode Verifier, in: Journal of Mathematical Structures in Computer Science, 2012.
International Conferences with Proceedings
12A. Almeida-Matos, J. Fragoso Santos. Typing Illegal Information Flow as Program Effects, in: Proceedings of the 7th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, 2012.
13G. Boudol, G. Petri, B. Serpette. Relaxed Operational Semantics of Concurrent Programming Languages, in: Expressiveness in Concurrency/Structural Operational Semantics (EXPRESS/SOS), EPTCS, 2012, vol. 89, p. 19-33.
14Z. Luo, T. Rezk. The Mashic Compiler: Mashup Sandboxing using Inter-frame Communication, in: Computer Security Foundations (CSF), 2012.
National Conferences with Proceeding
15E. Chailloux, B. Serpette. Séparation des couleurs dans un lambda-calcul bichrome, in: Actes des journées JFLA, Carnac, France, 2012.