T. H. Austin and C. Flanagan, Multiple facets for dynamic information flow, Proc. of the 39th Symposium of Principles of Programming Languages, 2012.

M. Ayenson, D. J. Wambach, A. Soltani, N. Good, and C. J. Hoofnagle, Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning, SSRN Electronic Journal, p.SSRN eLibrary, 2011.
DOI : 10.2139/ssrn.1898390

M. Backes, B. Köpf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009.
DOI : 10.1109/SP.2009.18

A. Barth, C. Jackson, and J. C. Mitchell, Securing frame communication in browsers, Communications of the ACM, vol.52, issue.6, pp.83-91, 2009.
DOI : 10.1145/1516046.1516066

L. Bauer, J. Ligatti, and D. Walker, Edit Automata: Enforcement Mechanisms for Run-time Security Policies, International Journal of Information Security, vol.4, issue.12, pp.2-16, 2005.

D. Clark, S. Hunt, and P. Malacaria, A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007.
DOI : 10.3233/JCS-2007-15302

M. R. Clarkson, A. C. Myers, and F. B. Schneider, Quantifying information flow with beliefs, Journal of Computer Security, vol.17, issue.5, pp.655-701, 2009.
DOI : 10.3233/JCS-2009-0353

URL : http://doi.org/10.3233/jcs-2009-0353

E. Commission, Commission proposes a comprehensive reform of the data protection rules

D. Groef, W. Devriese, D. Nikiforakis, N. Piessens, and F. , FlowFox, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.748-759, 2012.
DOI : 10.1145/2382196.2382275

D. Devriese and F. Piessens, Non-interference through secure multi-execution, Proc. of the 2010 Symposium on Security and Privacy, pp.109-124, 2010.
DOI : 10.1109/sp.2010.15

URL : https://lirias.kuleuven.be/bitstream/123456789/265429/1/secure-multi-execution-final.pdf

P. Eckersley, The Panopticlick project, https://panopticlick.eff.org [12] Eckersley, P.: How unique is your browser?, Proc. of the 2010 Privacy Enhancing Technologies Symposium, pp.1-18, 2011.

D. Hedin and A. Sabelfeld, Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, pp.3-18, 2012.
DOI : 10.1109/CSF.2012.19

B. Köpf and D. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

B. Köpf and A. Rybalchenko, Approximation and Randomization for Quantitative Information-Flow Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.3-14, 2010.
DOI : 10.1109/CSF.2010.8

N. Kroes, Privacy online: USA jumps aboard the Do- Not-Track standard, 2012.

N. Kroes, Why we need a sound Do-Not-Track standard for privacy online, 2012.

L. Guernic and G. , Confidentiality Enforcement Using Dynamic Information Flow Analyses, 2007.
URL : https://hal.archives-ouvertes.fr/tel-00198621

L. Guernic and G. , Precise Dynamic Verification of Confidentiality, Proc. of the 5th International Verification Workshop. CEUR Workshop Proc, pp.82-96, 2008.

L. Guernic, G. Banerjee, A. Jensen, T. Schmidt, and D. , Automata-Based Confidentiality Monitoring, Proc. of the Annual Asian Computing Science Conference, pp.75-89, 2006.
DOI : 10.1007/11555827_21

URL : https://hal.archives-ouvertes.fr/inria-00130210

P. Mardziel, S. Magill, M. Hicks, and M. Srivatsa, Dynamic Enforcement of Knowledge-Based Security Policies, 2011 IEEE 24th Computer Security Foundations Symposium, pp.114-128, 2011.
DOI : 10.1109/CSF.2011.15

J. R. Mayer and J. C. Mitchell, Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, pp.413-427, 2012.
DOI : 10.1109/SP.2012.47

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.5781

S. Mccamant and M. D. Ernst, Quantitative information flow as network flow capacity, Proc. of the ACM, 2008.

. Conf, on Programming Language Design and Implementation, pp.193-205, 2008.

A. Mcdonald and L. Cranor, A survey of the use of adobe flash local shared objects to respawn http cookies, 2011.

S. Moore and S. Chong, Static Analysis for Efficient Hybrid Information-Flow Control, 2011 IEEE 24th Computer Security Foundations Symposium, pp.146-160, 2011.
DOI : 10.1109/CSF.2011.17

A. D. Party, Letter to the online advertisement industry Available online: http://ec.europa.eu/justice/data-protection/article-29/ documentation/other-document/files, 20110803_ letter_to_oba_annexes.pdf [27] QIF project: Coq proof of monitor correctness, 2011.

A. Russo and A. Sabelfeld, Dynamic vs. Static Flow-Sensitive Security Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.186-199, 2010.
DOI : 10.1109/CSF.2010.20

G. Smith, On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, pp.288-302, 2009.
DOI : 10.1137/060651380

A. Soltani, Respawn redux Online, 2011.

A. Soltani, S. Canty, Q. Mayo, L. Thomas, and C. J. Hoofnagle, Flash Cookies and Privacy, AAAI Spring Symposium: Intelligent Information Privacy Management, 2010.
DOI : 10.2139/ssrn.1446862

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.401.7830