A. Almeida-matos, J. Santos, and T. Rezk, An IF monitor for a core of DOM

T. H. Austin and C. Flanagan, Efficient purely-dynamic information flow analysis, PLAS, 2009.
DOI : 10.1145/1667209.1667223

T. H. Austin and C. Flanagan, Permissive dynamic information flow analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, 2010.
DOI : 10.1145/1814217.1814220

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.9422

T. H. Austin and C. Flanagan, Multiple facets for dynamic information flow, POPL, 2012.
DOI : 10.1145/2103656.2103677

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.8564

A. Banerjee and D. A. Naumann, Secure information flow and pointer confinement in a Java-like language, CSFW, 2002.
DOI : 10.1109/csfw.2002.1021820

P. Gardner, G. Smith, M. J. Wheelhouse, and U. Zarfaty, DOM: Towards a formal specification, PLAN-X, 2008.

G. and L. Guernic, Confidentiality Enforcement Using Dynamic Information Flow Analyses, 2007.
URL : https://hal.archives-ouvertes.fr/tel-00198621

D. Hedin, B. Birgisson, L. Bello, and A. Sabelfeld, JSFlow, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, 2014.
DOI : 10.1145/2554850.2554909

D. Hedin and A. Sabelfeld, Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, 2012.
DOI : 10.1109/CSF.2012.19

W. Recommendation and . Dom, Document Object Model (DOM), p.3, 2005.

A. Russo and A. Sabelfeld, Dynamic vs. Static Flow-Sensitive Security Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, 2010.
DOI : 10.1109/CSF.2010.20

A. Russo, A. Sabelfeld, and A. Chudnov, Tracking Information Flow in Dynamic Tree Structures, ESORICS, 2009.
DOI : 10.1007/3-540-48294-6_20

A. Sabelfeld and A. Russo, From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research, Ershov Memorial Conference, 2009.
DOI : 10.1007/978-3-642-11486-1_30

P. Shroff, S. F. Smith, and M. Thober, Dynamic Dependency Monitoring to Secure Information Flow, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007.
DOI : 10.1109/CSF.2007.20

V. N. Venkatakrishnan, W. Xu, D. C. Duvarney, and R. Sekar, Provably Correct Runtime Enforcement of Non-interference Properties, ICICS, 2006.
DOI : 10.1007/11935308_24