1. Barthe, G., D’Argenio, P., Rezk, T.: Secure information flow by self-composition. In: Computer Security Foundation Workshop (CSFW 2017). IEEE Press, Los Alamitos (2004)
2. Blondeel, H.-C.: Security by logic: characterizing non-interference in temporal logic. Master’s thesis, KTH Sweden (2007),
ftp://ftp-sop.inria.fr/everest/Marieke.Huisman/blondeel.pdf
3. Boudol, G., Castellani, I.: Noninterference for concurrent programs and thread systems. Theor. Comput. Sci. 281(1-2), 109–130 (2002)
4. Lecture Notes in Computer Science;T. Chen,2007
5. Dam, M., Gurov, D.: mu-calculus with explicit points and approximations. Journal of Logic and Computation 12, 43–57 (2002)