A logic for information flow in objectoriented programs, Proc. ACM Symp. on Principles of Programming Languages, pp.91-102, 2006. ,
Java bytecode verification for secure information flow, AC96] M. Abadi and L. Cardelli. A Theory of Objects. Monographs in Computer Science, pp.20-27, 1996. ,
DOI : 10.1145/966051.966055
Termination-insensitive noninterference leaks more than just a bit Catch me if you can: Permissive yet secure error handling, Proc. European Symp. on Research in Computer Security Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS), pp.333-348, 2008. ,
DOI : 10.1007/978-3-540-88313-5_22
URL : http://www.md.chalmers.se/~andrei/esorics08.pdf
Checking secure interactions of smart card applets: extended version, J. Computer Security, vol.10, issue.4, pp.369-398, 2002. ,
Checking secure information flow in java bytecode by code transformation and standard bytecode verification . Software: Practice and Experience, pp.1225-1255, 2005. ,
DOI : 10.1002/spe.611
URL : http://www2.ing.unipi.it/~o1103499/papers/spe04.pdf
Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005. ,
DOI : 10.1017/S0956796804005453
A certified lightweight non-interference java bytecode verifier Barthe and T. Rezk. Non-interference for a jvm-like language, Proc. European Symp. on Programming Proc. Types in Language Design and Implementation, pp.103-112, 2005. ,
DOI : 10.1007/978-3-540-71316-6_10
Deriving an information flow checker and certifying compiler for java Barthe and B. Serpette. Partial evaluation and non-interference for object calculi, Proc. IEEE Symp. on Security and Privacy Proc. FLOPS, pp.230-242, 1999. ,
DOI : 10.1109/sp.2006.13
URL : http://www.cs.stevens-tech.edu/~naumann/publications/barthe-naumann-rezk.pdf
Making javascript safe for advertising. adsafe.org, 2009. ,
Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977. ,
DOI : 10.1145/359636.359712
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
The Java TM Language Specification, 1996. ,
Security policies and security models Noninterference in the presence of non-opaque pointers Hammer and G. Snelting. Flow-sensitive, context-sensitive, and object-sensitive informationflow control based on program dependence graphs, Proc. IEEE Symp. on Security and Privacy Proc. IEEE Computer Security Foundations Workshop, pp.11-20, 1982. ,
Language-based security Dynamics class loading in the Java virtual machine, Proc. Mathematical Foundations of Computer Science Proc. ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages & Applications, pp.284-298, 1998. ,
Java bytecode verification: algorithms and formalizations, Journal of Automated Reasoning, vol.30, issue.3/4, pp.235-269, 2003. ,
DOI : 10.1023/A:1025055424017
URL : https://hal.archives-ouvertes.fr/hal-01499939
The Java TM Virtual Machine Specification, 1999. ,
Caja: Safe active content in sanitized javascript, 2008. ,
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999. ,
DOI : 10.1145/292540.292561
Jif: Java information flow. Software release, 2001. ,
From Coupling Relations to Mated Invariants for Checking Information Flow, Proc. European Symp. on Research in Computer SecurityPS03] F. Pottier and V. Simonet. Information flow inference for ML. ACM TOPLAS, pp.279-296117, 2003. ,
DOI : 10.1007/11863908_18
The Flow Caml system. Software release. Located at http:// cristal.inria.fr/ ? simonet, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00069896
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
A Language-Based Approach to Security, Informatics?10 Years Back, 10 Years Ahead, pp.86-101, 2000. ,
DOI : 10.1007/3-540-44577-3_6
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304
SAFKASI: a security mechanism for language-based systems, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.341-378, 2000. ,
DOI : 10.1145/363516.363520
URL : http://www.cs.rice.edu/~dwallach/pub/tosem2000.ps