J. M. Mccune, T. Jaeger, S. Berger, R. Cáceres, and R. Sailer, Shamon: A System for Distributed Mandatory Access Control, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.23-32, 2006.
DOI : 10.1109/ACSAC.2006.47

A. Hernandez and F. Nielson, Enforcing mandatory access control in distributed systems using aspect orientation, 21st Nordic Workshop on Programming Theory ? NWPT2009, pp.62-64, 2009.

R. Wu, G. Ahn, H. Hu, and M. Singhal, Information flow control in cloud computing, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, pp.1-7, 2010.
DOI : 10.4108/icst.trustcol.2010.1

M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek et al., Information flow control for standard os abstractions, Proceedings of the 21st Symposium on Operating Systems Principles, 2007.

N. Zeldovich, S. Boyd-wickizer, E. Kohler, and D. Mazì-eres, Making information flow explicit in HiStar, OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation, pp.263-278, 2006.
DOI : 10.1145/2018396.2018419

P. Efstathopoulos, M. Krohn, S. Vandebogart, C. Frey, D. Ziegler et al., Labels and event processes in the asbestos operating system, SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles, pp.17-30, 2005.

S. Geller and C. Hauser, Frédéric Tronel, Valérie Viet Triem Tong Information flow control for intrusion detection derived from mac policy, Proceedings of the IEEE International Conference on Computer Communications (ICC), 2011.

C. Hauser, F. Tronel, J. F. Reid, and C. J. Fidge, A taint marking approach to confidentiality violation detection, 10th Australasian Information Security Conference, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00736045

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

A. C. Myers and B. Liskov, A decentralized model for information flow control, ACM SIGOPS Operating Systems Review, vol.31, issue.5, pp.129-142, 1997.
DOI : 10.1145/269005.266669

I. Roy, D. E. Porter, M. D. Bond, K. S. Mckinley, and E. Witchel, Laminar: practical fine-grained decentralized information flow control, Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation, 2009.

A. C. Myers and B. Liskov, Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.410-442, 2000.
DOI : 10.1145/363516.363526

N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni et al., RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), pp.243-254, 2004.
DOI : 10.1109/MICRO.2004.31

N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis, Hardware enforcement of application security policies using tagged memory, Proceedings of OSDI USENIX Association, pp.225-240, 2008.

H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, Panorama, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.116-127, 2007.
DOI : 10.1145/1315245.1315261

J. Newsome and D. Song, Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005.

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung et al., Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones Virtualization with kvm, Proceedings of the 9th USENIX conference on Operating systems design and implementation, ser. OSDI'10. USENIX Association, pp.1-6, 2008.