Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
N. Bielova, T. Rezk.
A Taxonomy of Information Flow Monitors, in: International Conference on Principles of Security and Trust (POST 2016), Eindhoven, Netherlands, F. Piessens, L. Viganò (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2016, vol. 9635, pp. 46–67. [ DOI : 10.1007/978-3-662-49635-0_3 ]
https://hal.inria.fr/hal-01348188
[2]
G. Boudol, I. Castellani.
Noninterference for Concurrent Programs and Thread Systems, in: Theoretical Computer Science, 2002, vol. 281, no 1, pp. 109-130.
[3]
G. Boudol, Z. Luo, T. Rezk, M. Serrano.
Reasoning about Web Applications: An Operational Semantics for HOP, in: ACM Transactions on Programming Languages and Systems (TOPLAS), 2012, vol. 34, no 2.
[4]
S. Capecchi, I. Castellani, M. Dezani-Ciancaglini.
Information Flow Safety in Multiparty Sessions, in: Mathematical Structures in Computer Science, 2015, vol. 26, no 8, 43 p. [ DOI : 10.1017/S0960129514000619 ]
https://hal.inria.fr/hal-01237236
[5]
I. Castellani, M. Dezani-Ciancaglini, P. Giannini.
Concurrent Reversible Sessions, in: CONCUR 2017 - 28th International Conference on Concurrency Theory , Berlin, Germany, CONCUR 2017, Roland Meyer and Uwe Nestmann, September 2017, vol. 85, pp. 1-17. [ DOI : 10.4230/LIPIcs.CONCUR.2017.30 ]
https://hal.inria.fr/hal-01639845
[6]
C. Fournet, T. Rezk.
Cryptographically sound implementations for typed information-flow security, in: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, 2008, pp. 323-335.
[7]
M. Ngo, F. Piessens, T. Rezk.
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements, in: SP 2018 - IEEE Symposium on Security and Privacy, San Francisco, United States, IEEE, May 2018, pp. 496-513. [ DOI : 10.1109/SP.2018.00048 ]
https://hal.inria.fr/hal-01928669
[8]
M. Serrano, G. Berry.
Multitier Programming in Hop - A first step toward programming 21st-century applications, in: Communications of the ACM, August 2012, vol. 55, no 8, pp. 53–59. [ DOI : 10.1145/2240236.2240253 ]
http://cacm.acm.org/magazines/2012/8/153796-multitier-programming-in-hop/abstract
[9]
M. Serrano, V. Prunet.
A Glimpse of Hopjs, in: 21th ACM Sigplan Int'l Conference on Functional Programming (ICFP), Nara, Japan, September 2016, pp. 188–200.
http://dx.doi.org/10.1145/2951913.2951916
[10]
D. F. Somé, N. Bielova, T. Rezk.
On the Content Security Policy Violations due to the Same-Origin Policy, in: 26th International World Wide Web Conference, 2017 (WWW 2017), April 2017. [ DOI : 10.1145/3038912.3052634 ]
https://hal.inria.fr/hal-01649526
Publications of the year

Articles in International Peer-Reviewed Journals

[11]
I. Castellani, M. Dezani-Ciancaglini, P. Giannini.
Reversible sessions with flexible choices, in: Acta Informatica, November 2019, vol. 56, no 7-8, pp. 553-583. [ DOI : 10.1007/s00236-019-00332-y ]
https://hal.inria.fr/hal-02420508
[12]
I. Castellani, M. Dezani-Ciancaglini, P. Giannini, R. Horne.
Global types with internal delegation, in: Theoretical Computer Science, September 2019. [ DOI : 10.1016/j.tcs.2019.09.027 ]
https://hal.inria.fr/hal-02419937

International Conferences with Proceedings

[13]
C. Boniface, I. Fouad, N. Bielova, C. Lauradoux, C. Santos.
Security Analysis of Subject Access Request Procedures How to authenticate data subjects safely when they request for their data, in: APF 2019 - Annual Privacy Forum, Rome, Italy, June 2019, pp. 1-20.
https://hal.inria.fr/hal-02072302
[14]
I. Castellani, M. Dezani-Ciancaglini, P. Giannini.
Event Structure Semantics for Multiparty Sessions, in: Models, Languages, and Tools for Concurrent and Distributed Programming - Hommage to Rocco De Nicola on the Occasion of His 65th Birthday, Lucca, Italy, Lecture Notes in Computer Science, Michele Boreale and Flavio Corradini and Michele Loreti and Rosario Pugliese, July 2019, vol. 11665, pp. 340-363. [ DOI : 10.1007/978-3-030-21485-2_19 ]
https://hal.inria.fr/hal-02420485
[15]
I. Fouad, N. Bielova, A. Legout, N. Sarafijanovic-Djukic.
Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels, in: PETS 2020 - 20th Privacy Enhancing Technologies Symposium, Montréal, Canada, PETs (Privacy Enhancing Technologies Symposium), July 2020.
https://hal.inria.fr/hal-01943496
[16]
B. Petit, M. Serrano.
Composing and Performing Interactive Music using the HipHop.js language, in: NIME 2019 - New Interfaces for Musical Expression, Porto Allegre, Brazil, June 2019.
https://hal.inria.fr/hal-02410197
[17]
M. Serrano, M. Feeley.
Property caches revisited, in: CC 2019 - 28th International Conference on Compiler Construction, Washington, United States, ACM Press, February 2019, pp. 99-110. [ DOI : 10.1145/3302516.3307344 ]
https://hal.inria.fr/hal-02418678
[18]
D. F. Somé.
EmPoWeb: Empowering Web Applications with Browser Extensions, in: SP 2019 - 40th IEEE Symposium on Security and Privacy, San Francisco, United States, May 2019.
https://hal.archives-ouvertes.fr/hal-02433525

Scientific Books (or Scientific Book chapters)

[19]
I. Castellani, M. R. Mousavi.
Special Issue on Trends in Concurrency Theory (selected invited contributions from the workshops TRENDS 2015 and 2016), Elsevier, October 2019, vol. 107, pp. 175-176. [ DOI : 10.1016/j.jlamp.2019.07.001 ]
https://hal.inria.fr/hal-02422352

Internal Reports

[20]
M. Cano, I. Castellani, C. Di Giusto, J. A. Pérez.
Multiparty Reactive Sessions, Inria, April 2019, no 9270, 65 p.
https://hal.archives-ouvertes.fr/hal-02106742
[21]
I. Castellani, M. Dezani-Ciancaglini, P. Giannini.
Event structure semantics for multiparty sessions, INDES, March 2019, no RR-9266.
https://hal.inria.fr/hal-02081943
References in notes
[22]
A. Cormack.
Is the Subject Access Right Now Too Great a Threat to Privacy?, in: European Data Protection Law Review, 2016, vol. 2, no 1, pp. 15-27.