Bibliography
Major publications by the team in recent years
-
1G. Barthe, T. Rezk, A. Russo, A. Sabelfeld.
Security of Multithreaded Programs by Compilation, in: ESORICS, 2007, pp. 2-18. -
2G. Boudol, I. Castellani.
Noninterference for Concurrent Programs and Thread Systems, in: Theoretical Computer Science, 2002, vol. 281, no 1, pp. 109-130. -
3G. Boudol, Z. Luo, T. Rezk, M. Serrano.
Reasoning about Web Applications: An Operational Semantics for HOP, in: ACM Transactions on Programming Languages and Systems (TOPLAS), 2012, vol. 34, no 2. -
4S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.
Typing access control and secure information flow in sessions, in: Journal of Information and Computation, 2014, vol. 238, pp. 68 - 105. [ DOI : 10.1016/j.ic.2014.07.005 ]
https://hal.inria.fr/hal-01088782 -
5S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.
Information Flow Safety in Multiparty Sessions, in: Mathematical Structures in Computer Science, 2015, vol. 26, no 8, 43 p. [ DOI : 10.1017/S0960129514000619 ]
https://hal.inria.fr/hal-01237236 -
6C. Fournet, T. Rezk.
Cryptographically sound implementations for typed information-flow security, in: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, 2008, pp. 323-335. -
7M. Serrano, G. Berry.
Multitier Programming in Hop - A first step toward programming 21st-century applications, in: Communications of the ACM, August 2012, vol. 55, no 8, pp. 53–59. [ DOI : 10.1145/2240236.2240253 ]
http://cacm.acm.org/magazines/2012/8/153796-multitier-programming-in-hop/abstract -
8M. Serrano, E. Gallesio, F. Loitsch.
HOP, a language for programming the Web 2.0, in: Proceedings of the First Dynamic Languages Symposium, Portland, Oregon, USA, October 2006. -
9M. Serrano.
Bee: an Integrated Development Environment for the Scheme Programming Language, in: Journal of Functional Programming, May 2000, vol. 10, no 2, pp. 1–43.
Articles in International Peer-Reviewed Journals
-
10N. Bielova, F. Besson, T. Jensen.
Using JavaScript Monitoring to Prevent Device Fingerprinting, in: ERCIM News, July 2016.
https://hal.inria.fr/hal-01353997 -
11I. Castellani, M. Dezani-Ciancaglini, J. A. Perez.
Self-adaptation and secure information flow in multiparty communications, in: Formal Aspects of Computing, 2016, vol. 28, no 4, 28 p. [ DOI : 10.1007/s00165-016-0381-3 ]
https://hal.inria.fr/hal-01354906 -
12Z. Luo, J. Fragoso Santos, A. Almeida Matos, T. Rezk.
Mashic compiler: Mashup sandboxing based on inter-frame communication, in: Journal of Computer Security, 2016. [ DOI : 10.3233/JCS-160542 ]
https://hal.inria.fr/hal-01353966 -
13S. E. Reppou, E. G. Tsardoulias, A. M. Kintsakis, A. L. Symeonidis, P. A. Mitkas, F. E. Psomopoulos, G. T. Karagiannis, C. Zelienski, V. Prunet, J.-P. Merlet, M. Iturburu, A. Gkiokas.
RAPP: A Robotic-Oriented Ecosystem for Delivering Smart User Empowering Applications for Older People, in: International Journal of Social Robotics, June 2016. [ DOI : 10.1007/s12369-016-0361-z ]
https://hal.inria.fr/hal-01336250
International Conferences with Proceedings
-
14F. Besson, N. Bielova, T. Jensen.
Hybrid Monitoring of Attacker Knowledge, in: 29th IEEE Computer Security Foundations Symposium, Lisboa, Portugal, 2016.
https://hal.inria.fr/hal-01310572 -
15N. Bielova.
Dynamic leakage - a need for a new quantitative information flow measure, in: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, Vienna, Austria, October 2016, pp. 83-88. [ DOI : 10.1145/2993600.2993607 ]
https://hal.inria.fr/hal-01409706 -
16N. Bielova, T. Rezk.
A Taxonomy of Information Flow Monitors, in: International Conference on Principles of Security and Trust (POST 2016), Eindhoven, Netherlands, F. Piessens, L. Viganò (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2016, vol. 9635, pp. 46–67. [ DOI : 10.1007/978-3-662-49635-0_3 ]
https://hal.inria.fr/hal-01348188 -
17N. Bielova, T. Rezk.
Spot the Difference: Secure Multi-Execution and Multiple Facets, in: European Symposium on Research in Computer Security (ESORICS), Heraklion, Greece, September 2016.
https://hal.inria.fr/hal-01348192 -
18I. Castellani, M. Dezani-Ciancaglini, U. De'Liguoro.
Secure Multiparty Sessions with Topics, in: PLACES 2016, Eindhoven, Netherlands, Proceedings of the 9th workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, PLACES 2016, Eindhoven, The Netherlands, 8th April 2016., Dominic A. Orchard and Nobuko Yoshida, April 2016, vol. 211, 12 p. [ DOI : 10.4204/EPTCS.211.1 ]
https://hal.inria.fr/hal-01354905 -
19V. Rajani, D. Garg, T. Rezk.
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks, in: Computer Security Foundations, Lisbon, Portugal, June 2016. [ DOI : 10.1109/CSF.2016.18 ]
https://hal.inria.fr/hal-01353963 -
20M. Serrano, V. Prunet.
A Glimpse of Hopjs, in: International Conference on Functional Programming (ICFP), Nara, Japan, ACM, September 2016, 12 p. [ DOI : 10.1145/2951913.2951916 ]
https://hal.inria.fr/hal-01350936
National Conferences with Proceedings
-
21B. P. Serpette, D. Janin.
Causalité dans les calculs d'événements, in: JFLA 2017 - Vingt-huitième Journées Francophones des Langages Applicatifs, Gourette, France, January 2017.
https://hal.inria.fr/hal-01403369
Scientific Books (or Scientific Book chapters)
-
22M. Serrano.
The Computer Scientist Nightmare: My Favorite Bug, in: A List of Successes That Can Change the World : Essays Dedicated to Philip Wadler on the Occasion of His 60th Birthday, Lecture Notes on Computer Science, Springer, April 2016, vol. 9600, pp. 356-366.
https://hal.archives-ouvertes.fr/hal-01340384
Books or Proceedings Editing
-
23M. Serrano, J. Hage (editors)
Trends in Functional Programming (TFP 2015): Revised Selected Papers, Lecture Notes on Computer Science, Springer Verlag, Sophia Antipolis, France, February 2016, vol. 9547, 156 p. [ DOI : 10.1007/978-3-319-39110-6 ]
https://hal.inria.fr/hal-01354237
Internal Reports
-
24D. Janin, B. P. Serpette.
Timed Denotational Semantics for Causal Functions over Timed Streams, LaBRI - Laboratoire Bordelais de Recherche en Informatique, November 2016.
https://hal.archives-ouvertes.fr/hal-01402209 -
25B. P. Serpette.
Logical semantics of Esterel with unconstrained local signals, Inria Sophia Antipolis - Méditerranée, August 2016, no RR-8942.
https://hal.archives-ouvertes.fr/hal-01351005 -
26B. P. Serpette.
Using counters for absence prediction in Esterel, Inria Sophia Antipolis - Méditerranée, July 2016, no RR-8941, 18 p.
https://hal.inria.fr/hal-01226760