1. Abadi, M.: Secrecy by typing in security protocols. JACM 46(5), 749–786 (1999)
2. Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A.D., Maffeis, S.: Refinement types for secure implementations. In: IEEE Computer Security Foundations Symposium, pp. 17–32 (2008)
3. Bhargavan, K., Fournet, C., Gordon, A.D.: F7: Refinement types for F#. version 1.0 (2008),
http://research.microsoft.com/en-us/projects/F7/
4. Baughman, N.E., Levine, B.N.: Cheat-proof playout for centralized and distributed online games. In: 20th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.1 (2001)
5. Cederquist, J.G., Corin, R., Dekker, M.A.C., Etalle, S., den Hartog, J.I., Lenzini, G.: Audit-based compliance control. International Journal of Information Security 6(2), 133–151 (2007)