, Determinism over the rules : given a term and a state, only one rule applies

, Determinism over the results : given a term, a state and a rule, only one state can be the result

, 6 hypotheses concerning the correctness of additional parameters of the axioms

, 3 hypotheses over the up and next functions

, Annotated Multisemantics From this Pretty-Big-Step semantics

A. Torben, B. Sruthi, and B. Anindya, Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.91-102, 2006.

A. Aslan, Computer Security -ESORICS 2008, 13th European Symposium on Research in Computer Security, pp.333-348, 2008.

A. Mounir, « Hypercollecting semantics and its application to static analysis of information flow, Proceedings of the 44th

, ACM SIGPLAN Symposium on Principles of Programming Languages, pp.874-887, 2017.

H. Thomas, . Austin, and F. Cormac, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, pp.113-124, 2009.

H. Thomas, . Austin, and F. Cormac, Multiple facets for dynamic information flow, Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.165-178, 2012.

H. Thomas, . Austin, and F. Cormac, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, vol.3, pp.1-3, 2010.

B. Michael, K. Boris, and R. Andrey, Automatic Discovery and Quantification of Information Leaks, pp.141-153, 2009.

B. Gilles, P. R. D'argenio-et-tamara, and R. , « Secure information flow by self-composition, Mathematical Structures in Computer Science, vol.21, pp.1207-1252, 2011.

B. Gilles, P. David, R. Tamara, and «. , Certified Lightweight Non-interference Java Bytecode Verifier, Held as Part of the Joint European Conferences on Theory and Practics of Software, pp.125-140, 2007.

B. Lennart and H. Martin, 20th IEEE Computer Security Foundations Symposium, CSF, pp.233-248, 2007.

B. Nataliia, R. Tamara, and «. , Principles of Security and Trust -5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, pp.46-67, 2016.

M. Bodin, Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.87-100, 2014.

B. Gérard and C. Ilaria, Noninterference for Concurrent Programs, p.28

, , pp.382-395, 2001.

C. Ethan, A. C. Myers, and A. Owen, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1875-1891, 2017.

C. Arthur and . Pretty, Programming Languages and Systems -22nd European Symposium on Programming, ESOP 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, pp.41-60, 2013.

R. Michael, F. B. Clarkson, . Schneider, and . Hyperproperties, Journal of Computer Security, vol.18, pp.1157-1210, 2010.

C. Ellis and «. , Information Transmission in Computational Systems, Proceedings of the Sixth ACM Symposium on Operating Systems Principles, SOSP '77, pp.133-139, 1977.

C. Thierry and H. Gérard, The calculus of constructions », thèse de doct., INRIA, 1986.

D. E. Denning and «. , Lattice Model of Secure Information Flow, vol.19, pp.236-243, 1976.

D. E. Denning, J. Peter, and . Denning, Certification of Programs for Secure Information Flow, vol.20, pp.1-0782, 1977.

D. Dominique and P. Frank, Noninterference through Secure Multi-execution, vol.2010, pp.109-124, 2010.

A. Joseph, . Goguen, and M. José, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.

G. Georges and . The, Four Colour Theorem : Engineering of a Formal Proof, Computer Mathematics, 8th Asian Symposium, p.333, 2007.

G. Georges, « A Machine-Checked Proof of the Odd Order Theorem, Interactive Theorem Proving -4th International Conference, ITP 2013, pp.163-179, 2013.

H. Daniel and S. Andrei, 25th IEEE Computer Security Foundations Symposium, CSF 2012, pp.3-18, 2012.

H. Sebastian, S. David, and «. , On flow-sensitive security types, Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.79-90, 2006.

K. Vineeth, W. Ben, and H. Ben, Timingand Termination-Sensitive Secure Information Flow : Exploring a New Approach, pp.413-428, 2011.

L. E. Gurvan and . Guernic, Confidentiality Enforcement Using Dynamic Information Flow Analyses, 2007.

L. Xavier, Communications of the ACM 52, vol.7, pp.107-115, 2009.

J. Lions, Flight, vol.501, 1996.

C. Newcombe, « How Amazon web services uses formal methods, Commun. ACM, vol.58, pp.66-73, 2015.

P. Andrei, H. Johannes, N. Tobias, and «. Noninterference, Certified Programs and Proofs -Second International Conference, vol.2012, pp.109-125, 2012.

A. Russo and S. Andrei, Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, pp.186-199, 2010.

A. Sabelfeld, C. Andrew, . Myers, and . Language, IEEE Journal on Selected Areas in Communications, vol.21, pp.5-19, 2003.

S. Andrei and A. Russo, From Dynamic to Static and Back : Riding the Roller Coaster of Information-Flow Control Research, pp.352-365, 2009.

S. Matthieu, O. Nicolas, and «. First, Theorem Proving in Higher Order Logics, 21st International Conference, pp.278-293, 2008.

, The Coq development TEAM, The Coq proof assistant reference manual, Version 8.6, 2016.

W. Philip and B. Stephen, Conference Record of the Sixteenth Annual ACM Symposium on Principles of Programming Languages, pp.60-76, 1989.