@article{DHS12, author = {Mariangiola Dezani-Ciancaglini and Ross Horne and Vladimiro Sassone}, title = {Tracing where and who provenance in Linked Data: A calculus}, journal = {Theor. Comput. Sci.}, volume = {464}, year = {2012}, pages = {113-129}, ee = {http://dx.doi.org/10.1016/j.tcs.2012.06.020}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{GJ03, author = {Andrew D. Gordon and Alan Jeffrey}, title = {Typing correspondence assertions for communication protocols}, journal = {Theor. Comput. Sci.}, volume = {300}, number = {1-3}, year = {2003}, pages = {379-409}, ee = {http://dx.doi.org/10.1016/S0304-3975(02)00333-X}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{corinD07, author = {Ricardo Corin and Pierre-Malo Deni{\'e}lou}, title = {A Protocol Compiler for Secure Sessions in ML}, year = {2007}, pages = {276-293}, ee = {http://dx.doi.org/10.1007/978-3-540-78663-4_19}, crossref = {DBLP:conf/tgc/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/tgc/2007, editor = {Gilles Barthe and C{\'e}dric Fournet}, booktitle = {Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4912}, year = {2008}, isbn = {978-3-540-78662-7}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{cairestcs08, author = {Lu\'{\i}s Caires}, title = {Spatial-behavioral types for concurrency and resource control in distributed systems}, journal = {Theor. Comput. Sci.}, volume = {402}, number = {2-3}, year = {2008}, pages = {120-141}, ee = {http://dx.doi.org/10.1016/j.tcs.2008.04.030}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{DBLP:journals/corr/abs-1211-4099, author = {Pedro Baltazar and Dimitris Mostrous and Vasco Thudichum Vasconcelos}, title = {Linearly Refined Session Types}, year = {2012}, pages = {38-49}, ee = {http://dx.doi.org/10.4204/EPTCS.101.4}, crossref = {DBLP:journals/corr/abs-1211-3480}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:journals/corr/abs-1211-3480, editor = {Sandra Alves and Ian Mackie}, booktitle = {Proceedings 2nd International Workshop on Linearity}, series = {EPTCS}, volume = {101}, year = {2012}, ee = {http://dx.doi.org/10.4204/EPTCS.101}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{francobeat13, author = {Juliana Franco and Vasco Thudichum Vasconcelos}, title = {A concurrent programming language with refined session types}, year = {2013}, pages = {33-42}, editor = {Simon Gay}, booktitle = {2nd International Workshop on Behavioural Types, BEAT 2, Madrid, Spain, September 23-24, 2013, Pre-proceedings}, publisher = {University Complutense of Madrid}, } @inproceedings{kouzapasbeat13, author = {Dimitrios Kouzapas and Anna Philippou}, title = {A Typing System for Privacy}, year = {2013}, pages = {51-60}, editor = {Simon Gay}, booktitle = {2nd International Workshop on Behavioural Types, BEAT 2, Madrid, Spain, September 23-24, 2013, Pre-proceedings}, publisher = {University Complutense of Madrid}, } @article{DBLP:journals/acta/Kobayashi05, author = {Naoki Kobayashi}, title = {Type-based information flow analysis for the pi-calculus}, journal = {Acta Inf.}, volume = {42}, number = {4-5}, year = {2005}, pages = {291-347}, ee = {http://dx.doi.org/10.1007/s00236-005-0179-x}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{DBLP:conf/icalp/HennessyR00, author = {Matthew Hennessy and James Riely}, title = {Information Flow vs. Resource Access in the Asynchronous Pi-Calculus}, year = {2000}, pages = {415-427}, ee = {http://dx.doi.org/10.1007/3-540-45022-X_35}, crossref = {DBLP:conf/icalp/2000}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/icalp/2000, editor = {Ugo Montanari and Jos{\'e} D. P. Rolim and Emo Welzl}, booktitle = {Automata, Languages and Programming, 27th International Colloquium, ICALP 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {1853}, year = {2000}, isbn = {3-540-67715-1}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{DBLP:journals/jfp/HondaY05, author = {Kohei Honda and Nobuko Yoshida}, title = {Noninterference through flow analysis}, journal = {J. Funct. Program.}, volume = {15}, number = {2}, year = {2005}, pages = {293-349}, ee = {http://dx.doi.org/10.1017/S0956796804005477}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{DBLP:journals/toplas/HondaY07, author = {Kohei Honda and Nobuko Yoshida}, title = {A uniform type structure for secure information flow}, journal = {ACM Trans. Program. Lang. Syst.}, volume = {29}, number = {6}, year = {2007}, ee = {http://doi.acm.org/10.1145/1286821.1286822}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{DBLP:journals/jlp/YoshidaHB07, author = {Nobuko Yoshida and Kohei Honda and Martin Berger}, title = {Linearity and bisimulation}, journal = {J. Log. Algebr. Program.}, volume = {72}, number = {2}, year = {2007}, pages = {207-238}, ee = {http://dx.doi.org/10.1016/j.jlap.2007.02.011}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{carbonepost13, author = {Marco Carbone and Joshua D. Guttman}, title = {Sessions and Separability in Security Protocols}, year = {2013}, pages = {267-286}, ee = {http://dx.doi.org/10.1007/978-3-642-36830-1_14}, crossref = {DBLP:conf/post/2013}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/post/2013, editor = {David A. Basin and John C. Mitchell}, booktitle = {Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7796}, year = {2013}, isbn = {978-3-642-36829-5}, ee = {http://dx.doi.org/10.1007/978-3-642-36830-1}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{lapadulafsen07, author = {Alessandro Lapadula and Rosario Pugliese and Francesco Tiezzi}, title = {Regulating Data Exchange in Service Oriented Applications}, year = {2007}, pages = {223-239}, ee = {http://dx.doi.org/10.1007/978-3-540-75698-9_15}, crossref = {DBLP:conf/fsen/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/fsen/2007, editor = {Farhad Arbab and Marjan Sirjani}, booktitle = {International Symposium on Fundamentals of Software Engineering, International Symposium, FSEN 2007, Tehran, Iran, April 17-19, 2007, Proceedings}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4767}, year = {2007}, isbn = {978-3-540-75697-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{acciaiiandc12, author = {Lucia Acciai and Michele Boreale}, title = {Deciding Safety Properties in Infinite-State $\pi$-Calculus via Behavioural Types}, journal = {Inf. Comput.}, volume = {212}, year = {2012}, pages = {92-117}, ee = {http://dx.doi.org/10.1016/j.ic.2012.01.006}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{acciaiiandc10, author = {Lucia Acciai and Michele Boreale}, title = {Spatial and Behavioral Types in the $\pi$-Calculus}, journal = {Inf. Comput.}, volume = {208}, number = {10}, year = {2010}, pages = {1118-1153}, ee = {http://dx.doi.org/10.1016/j.ic.2009.10.011}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{ghilezantar12, number = {2}, volume = {8}, author = {Silvia Ghilezan and Svetlana Jaksic and Jovanka Pantovic and Mariangiola Dezani-Ciancaglini}, url = {http://www.di.unito.it/~dezani/papers/gjpd.pdf}, title = {Types and Roles for Web Security}, journal = {Transactions on Advanced Research}, year = {2012}, pages = {16-21} } @inproceedings{jaksicictcs12, author = {Svetlana Jaksic}, title = {Input/Output Types for Dynamic Web Data}, year = {2012}, crossref = {DBLP:conf/ictcs/2012} } @proceedings{DBLP:conf/ictcs/2012, booktitle = {Theoretical Computer Science, 13th Italian Conference, ICTCS 2012, Varese, Italy, September 19-21, 2012, Proceedings}, year = {2012} } @article{dezanitcs08, author = {Mariangiola Dezani-Ciancaglini and Silvia Ghilezan and Jovanka Pantovic and Daniele Varacca}, title = {Security Types for Dynamic Web Data}, journal = {Theor. Comput. Sci.}, volume = {402}, number = {2-3}, year = {2008}, pages = {156-171}, ee = {http://dx.doi.org/10.1016/j.tcs.2008.04.032}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{dezaniwflp10, author = {Mariangiola Dezani-Ciancaglini and Silvia Ghilezan and Svetlana Jaksic and Jovanka Pantovic}, title = {Types for Role-Based Access Control of Dynamic Web Data}, year = {2010}, pages = {1-29}, ee = {http://dx.doi.org/10.1007/978-3-642-20775-4_1}, crossref = {DBLP:conf/wflp/2010}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/wflp/2010, editor = {Julio Mari{\~n}o}, booktitle = {Functional and Constraint Logic Programming - 19th International Workshop, WFLP 2010, Madrid, Spain, January 17, 2010. Revised Selected Papers}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6559}, year = {2011}, isbn = {978-3-642-20774-7}, ee = {http://dx.doi.org/10.1007/978-3-642-20775-4}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{cairespopl13, author = {Lu\'{\i}s Caires and Jo{\~a}o Costa Seco}, title = {The type discipline of behavioral separation}, year = {2013}, pages = {275-286}, ee = {http://doi.acm.org/10.1145/2429069.2429103}, crossref = {DBLP:conf/popl/2013}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/popl/2013, editor = {Roberto Giacobazzi and Radhia Cousot}, booktitle = {The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '13, Rome, Italy - January 23 - 25, 2013}, publisher = {ACM}, year = {2013}, isbn = {978-1-4503-1832-7}, ee = {http://dl.acm.org/citation.cfm?id=2429069}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{pfenningcpp11, author = {Frank Pfenning and Lu\'{\i}s Caires and Bernardo Toninho}, title = {Proof-Carrying Code in a Session-Typed Process Calculus}, year = {2011}, pages = {21-36}, ee = {http://dx.doi.org/10.1007/978-3-642-25379-9_4}, crossref = {DBLP:conf/cpp/2011}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/cpp/2011, editor = {Jean-Pierre Jouannaud and Zhong Shao}, booktitle = {Certified Programs and Proofs - First International Conference, CPP 2011, Kenting, Taiwan, December 7-9, 2011. Proceedings}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7086}, year = {2011}, isbn = {978-3-642-25378-2}, ee = {http://dx.doi.org/10.1007/978-3-642-25379-9}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{dahlatva11, author = {Morten Dahl and Naoki Kobayashi and Yunde Sun and Hans H{\"u}ttel}, title = {Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols}, year = {2011}, pages = {75-89}, ee = {http://dx.doi.org/10.1007/978-3-642-24372-1_7}, crossref = {DBLP:conf/atva/2011}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/atva/2011, editor = {Tevfik Bultan and Pao-Ann Hsiung}, booktitle = {Automated Technology for Verification and Analysis, 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011. Proceedings}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6996}, year = {2011}, isbn = {978-3-642-24371-4}, ee = {http://dx.doi.org/10.1007/978-3-642-24372-1}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{heideggerpopl12, author = {Phillip Heidegger and Annette Bieniusa and Peter Thiemann}, title = {Access Permission Contracts for Scripting Languages}, year = {2012}, pages = {111-122}, ee = {http://doi.acm.org/10.1145/2103656.2103671}, crossref = {DBLP:conf/popl/2012}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/popl/2012, editor = {John Field and Michael Hicks}, booktitle = {Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012}, publisher = {ACM}, year = {2012}, isbn = {978-1-4503-1083-3}, ee = {http://dl.acm.org/citation.cfm?id=2103656}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{capecchiconcur10, author = {Sara Capecchi and Ilaria Castellani and Mariangiola Dezani-Ciancaglini and Tamara Rezk}, title = {Session Types for Access and Information Flow Control}, year = {2010}, pages = {237-252}, ee = {http://dx.doi.org/10.1007/978-3-642-15375-4_17}, crossref = {DBLP:conf/concur/2010}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/concur/2010, editor = {Paul Gastin and Fran\c{c}ois Laroussinie}, booktitle = {CONCUR 2010 - Concurrency Theory, 21th International Conference, CONCUR 2010, Paris, France, August 31-September 3, 2010. Proceedings}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6269}, year = {2010}, isbn = {978-3-642-15374-7}, ee = {http://dx.doi.org/10.1007/978-3-642-15375-4}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{capecchiexpress11, author = {Sara Capecchi and Ilaria Castellani and Mariangiola Dezani-Ciancaglini}, title = {Information Flow Safety in Multiparty Sessions}, year = {2011}, pages = {16-30}, ee = {http://dx.doi.org/10.4204/EPTCS.64.2}, crossref = {DBLP:journals/corr/abs-1108-4077}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:journals/corr/abs-1108-4077, editor = {Bas Luttik and Frank Valencia}, booktitle = {Proceedings 18th International Workshop on Expressiveness in Concurrency}, series = {EPTCS}, volume = {64}, year = {2011}, ee = {http://dx.doi.org/10.4204/EPTCS.64}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{bonotgc11, author = {Viviana Bono and Sara Capecchi and Ilaria Castellani and Mariangiola Dezani-Ciancaglini}, title = {A Reputation System for Multirole Sessions}, year = {2011}, pages = {1-24}, ee = {http://dx.doi.org/10.1007/978-3-642-30065-3_1}, crossref = {DBLP:conf/tgc/2011}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/tgc/2011, editor = {Roberto Bruni and Vladimiro Sassone}, booktitle = {Trustworthy Global Computing - 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7173}, year = {2012}, isbn = {978-3-642-30064-6}, ee = {http://dx.doi.org/10.1007/978-3-642-30065-3}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{capecchiiandc13, author = {Sara Capecchi and Ilaria Castellani and Mariangiola Dezani-Ciancaglini}, title = {Typing Access Control and Secure Information Flow in Sessions}, journal = {Inf. Comput.}, year = {2013}, note = {To appear} } @inproceedings{baltazartgc12, author = {Pedro Baltazar and Lu\'{\i}s Caires and Vasco Thudichum Vasconcelos and Hugo Torres Vieira}, title = {A Type System for Flexible Role Assignment in Multiparty Communicating Systems}, year = {2012}, crossref = {DBLP:conf/tgc/2012} } @proceedings{DBLP:conf/tgc/2012, editor = {Catuscia Palamidessi and Mark Ryan}, booktitle = {Trustworthy Global Computing, 7th International Symposium, TGC 2012, Newcastle upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, year = {2013}, note = {To appear} } @inproceedings{planulconcur09, author = {J{\'e}r{\'e}my Planul and Ricardo Corin and C{\'e}dric Fournet}, title = {Secure Enforcement for Global Process Specifications}, year = {2009}, pages = {511-526}, ee = {http://dx.doi.org/10.1007/978-3-642-04081-8_34}, crossref = {DBLP:conf/concur/2009}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/concur/2009, editor = {Mario Bravetti and Gianluigi Zavattaro}, booktitle = {CONCUR 2009 - Concurrency Theory, 20th International Conference, CONCUR 2009, Bologna, Italy, September 1-4, 2009. Proceedings}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5710}, year = {2009}, isbn = {978-3-642-04080-1}, ee = {http://dx.doi.org/10.1007/978-3-642-04081-8}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{bhargavantiss07, author = {Karthikeyan Bhargavan and Ricardo Corin and C{\'e}dric Fournet and Andrew D. Gordon}, title = {Secure Sessions for Web Services}, journal = {ACM Trans. Inf. Syst. Secur.}, volume = {10}, number = {2}, year = {2007}, ee = {http://doi.acm.org/10.1145/1237500.1237504}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{bonellijfp05, author = {Eduardo Bonelli and Adriana B. Compagnoni and Elsa L. Gunter}, title = {Correspondence Assertions for Process Synchronization in Concurrent Communications}, journal = {J. Funct. Program.}, volume = {15}, number = {2}, year = {2005}, pages = {219-247}, ee = {http://dx.doi.org/10.1017/S095679680400543X}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{kolundzijawsfm08, author = {Marija Kolundzija}, title = {Security Types for Sessions and Pipelines}, year = {2008}, pages = {175-190}, ee = {http://dx.doi.org/10.1007/978-3-642-01364-5_11}, crossref = {DBLP:conf/wsfm/2008}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/wsfm/2008, editor = {Roberto Bruni and Karsten Wolf}, booktitle = {Web Services and Formal Methods, 5th International Workshop, WS-FM 2008, Milan, Italy, September 4-5, 2008, Revised Selected Papers}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5387}, year = {2009}, isbn = {978-3-642-01363-8}, ee = {http://dx.doi.org/10.1007/978-3-642-01364-5}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{bhargavancsf09, author = {Karthikeyan Bhargavan and Ricardo Corin and Pierre-Malo Deni{\'e}lou and C{\'e}dric Fournet and James J. Leifer}, title = {Cryptographic Protocol Synthesis and Verification for Multiparty Sessions}, year = {2009}, pages = {124-140}, ee = {http://doi.ieeecomputersociety.org/10.1109/CSF.2009.26}, crossref = {DBLP:conf/csfw/2009}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/csfw/2009, booktitle = {Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009}, publisher = {IEEE Computer Society}, year = {2009}, isbn = {978-0-7695-3712-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{corinjcs08, author = {Ricardo Corin and Pierre-Malo Deni{\'e}lou and C{\'e}dric Fournet and Karthikeyan Bhargavan and James J. Leifer}, title = {A Secure Compiler for Session Abstractions}, journal = {Journal of Computer Security}, volume = {16}, number = {5}, year = {2008}, pages = {573-636}, ee = {http://dx.doi.org/10.3233/JCS-2008-0334}, bibsource = {DBLP, http://dblp.uni-trier.de} } @inproceedings{corincsf07, author = {Ricardo Corin and Pierre-Malo Deni{\'e}lou and C{\'e}dric Fournet and Karthikeyan Bhargavan and James J. Leifer}, title = {Secure Implementations for Typed Session Abstractions}, year = {2007}, pages = {170-186}, ee = {http://dx.doi.org/10.1109/CSF.2007.29}, crossref = {DBLP:conf/csfw/2007}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/csfw/2007, booktitle = {20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy}, publisher = {IEEE Computer Society}, year = {2007}, bibsource = {DBLP, http://dblp.uni-trier.de} }