1. Secrecy by typing in security protocols;Abadi,1997
2. D.E. Bell, L.J. LaPadula, Secure computer system: unified exposition and multics interpretation, Technical report MTR-2997, MITRE Corporation, 1975
3. G. Boudol, Asynchrony and the π-calculus, Technical Report 1702, INRIA-Sophia Antipolis, 1992
4. Testing theories for asynchronous languages;Castellani,1998
5. S. Conchon, Modular information flow analysis for process calculi, in: I. Cervesato (Ed.), Proceedings of the Foundations of Computer Security Workshop (FCS 2002), Copenhagen, Denmark, July 2002