T. Amtoft, S. Bandhakavi, and A. Banerjee, A logic for information flow in objectoriented programs, Proc. ACM Symp. on Principles of Programming Languages, pp.91-102, 2006.

M. Avvenuti, C. Bernardeschi, and N. Francesco, Java bytecode verification for secure information flow, AC96] M. Abadi and L. Cardelli. A Theory of Objects. Monographs in Computer Science, pp.20-27, 1996.
DOI : 10.1145/966051.966055

S. [. Askarov, A. Hunt, D. Sabelfeld, and . Sands, Termination-insensitive noninterference leaks more than just a bit Catch me if you can: Permissive yet secure error handling, Proc. European Symp. on Research in Computer Security Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS), pp.333-348, 2008.
DOI : 10.1007/978-3-540-88313-5_22

URL : http://www.md.chalmers.se/~andrei/esorics08.pdf

. Bcg-+-02-]-p, J. Bieber, P. Cazin, J. Girard, G. Lanet et al., Checking secure interactions of smart card applets: extended version, J. Computer Security, vol.10, issue.4, pp.369-398, 2002.

C. Bernardeschi, N. De-francesco, G. Lettieri, and L. Martini, Checking secure information flow in java bytecode by code transformation and standard bytecode verification . Software: Practice and Experience, pp.1225-1255, 2005.
DOI : 10.1002/spe.611

URL : http://www2.ing.unipi.it/~o1103499/papers/spe04.pdf

A. Banerjee and D. A. Naumann, Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005.
DOI : 10.1017/S0956796804005453

G. Barthe, D. Pichardie, and T. Rezk, A certified lightweight non-interference java bytecode verifier Barthe and T. Rezk. Non-interference for a jvm-like language, Proc. European Symp. on Programming Proc. Types in Language Design and Implementation, pp.103-112, 2005.
DOI : 10.1007/978-3-540-71316-6_10

G. Barthe, T. Rezk, and D. Naumann, Deriving an information flow checker and certifying compiler for java Barthe and B. Serpette. Partial evaluation and non-interference for object calculi, Proc. IEEE Symp. on Security and Privacy Proc. FLOPS, pp.230-242, 1999.
DOI : 10.1109/sp.2006.13

URL : http://www.cs.stevens-tech.edu/~naumann/publications/barthe-naumann-rezk.pdf

D. Crockford, Making javascript safe for advertising. adsafe.org, 2009.

D. E. Denning and P. J. Denning, Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977.
DOI : 10.1145/359636.359712

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

J. Gosling, B. Joy, G. Steele, and G. Bracha, The Java TM Language Specification, 1996.

J. A. Goguen, J. Meseguerhs06, ]. D. Hedin, and D. Sands, Security policies and security models Noninterference in the presence of non-opaque pointers Hammer and G. Snelting. Flow-sensitive, context-sensitive, and object-sensitive informationflow control based on program dependence graphs, Proc. IEEE Symp. on Security and Privacy Proc. IEEE Computer Security Foundations Workshop, pp.11-20, 1982.

D. [. Kozen, G. Liang, and . Bracha, Language-based security Dynamics class loading in the Java virtual machine, Proc. Mathematical Foundations of Computer Science Proc. ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages & Applications, pp.284-298, 1998.

X. Leroy, Java bytecode verification: algorithms and formalizations, Journal of Automated Reasoning, vol.30, issue.3/4, pp.235-269, 2003.
DOI : 10.1023/A:1025055424017

URL : https://hal.archives-ouvertes.fr/hal-01499939

T. Lindholm and F. Yellin, The Java TM Virtual Machine Specification, 1999.

B. Samuel, I. Laurie, M. Awad, and . Stay, Caja: Safe active content in sanitized javascript, 2008.

A. C. Myers, JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999.
DOI : 10.1145/292540.292561

. C. Mzz-+-10-]-a, L. Myers, S. Zheng, S. Zdancewic, N. Chong et al., Jif: Java information flow. Software release, 2001.

D. Naumann, From Coupling Relations to Mated Invariants for Checking Information Flow, Proc. European Symp. on Research in Computer SecurityPS03] F. Pottier and V. Simonet. Information flow inference for ML. ACM TOPLAS, pp.279-296117, 2003.
DOI : 10.1007/11863908_18

V. Simonet, The Flow Caml system. Software release. Located at http:// cristal.inria.fr/ ? simonet, 2003.
URL : https://hal.archives-ouvertes.fr/inria-00069896

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

F. B. Schneider, G. Morrisett, and R. Harper, A Language-Based Approach to Security, Informatics?10 Years Back, 10 Years Ahead, pp.86-101, 2000.
DOI : 10.1007/3-540-44577-3_6

D. Volpano, G. Smith, and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.
DOI : 10.3233/JCS-1996-42-304

D. S. Wallach, A. W. Appel, and E. W. Felten, SAFKASI: a security mechanism for language-based systems, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.341-378, 2000.
DOI : 10.1145/363516.363520

URL : http://www.cs.rice.edu/~dwallach/pub/tosem2000.ps