Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies, 2012 IEEE 25th Computer Security Foundations Symposium, pp.308-322, 2012. ,
DOI : 10.1109/CSF.2012.31
Gradual Release: Unifying Declassification, Encryption and Key Release Policies, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.207-221, 2007. ,
DOI : 10.1109/SP.2007.22
Efficient purely-dynamic information flow analysis, PLAS'09, pp.113-124, 2009. ,
Permissive dynamic information flow analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, pp.1-3, 2010. ,
DOI : 10.1145/1814217.1814220
Securing frame communication in browsers, Communications of the ACM, vol.52, issue.6, pp.83-91, 2009. ,
DOI : 10.1145/1516046.1516066
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.3290
Hybrid Information Flow Monitoring against Web Tracking, 2013 IEEE 26th Computer Security Foundations Symposium, pp.240-254, 2013. ,
DOI : 10.1109/CSF.2013.23
URL : https://hal.archives-ouvertes.fr/hal-00924138
Required Information Release, 2010 23rd IEEE Computer Security Foundations Symposium, pp.637-676, 2012. ,
DOI : 10.1109/CSF.2010.22
Information Flow Monitoring as Abstract Interpretation for Relational Logic, 2014 IEEE 27th Computer Security Foundations Symposium, pp.48-62, 2014. ,
DOI : 10.1109/CSF.2014.12
Information Flow Monitor Inlining, 2010 23rd IEEE Computer Security Foundations Symposium, pp.200-214, 2010. ,
DOI : 10.1109/CSF.2010.21
Memoryless subsystems, The Computer Journal, vol.17, issue.2, pp.143-147, 1974. ,
DOI : 10.1093/comjnl/17.2.143
Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language, 2015 IEEE 28th Computer Security Foundations Symposium, 2015. ,
DOI : 10.1109/CSF.2015.31
JSFlow, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1663-1671, 2014. ,
DOI : 10.1145/2554850.2554909
Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, pp.3-18, 2012. ,
DOI : 10.1109/CSF.2012.19
On flow-sensitive security types, POPL'06, pp.79-90, 2006. ,
A lattice of information, [1993] Proceedings Computer Security Foundations Workshop VI, pp.65-70, 1993. ,
DOI : 10.1109/CSFW.1993.246638
Automata-based Confidentiality Monitoring, ASIAN'06, pp.75-89, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00130210
On-the-fly inlining of dynamic security monitors, SEC'10, pp.173-186, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-01054519
Static Analysis for Efficient Hybrid Information-Flow Control, 2011 IEEE 24th Computer Security Foundations Symposium, pp.146-160, 2011. ,
DOI : 10.1109/CSF.2011.17
An Analysis of Universal Information Flow Based on Self-Composition, 2015 IEEE 28th Computer Security Foundations Symposium, 2015. ,
DOI : 10.1109/CSF.2015.33
Dynamic vs. Static Flow-Sensitive Security Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.186-199, 2010. ,
DOI : 10.1109/CSF.2010.20
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
Programming languages for information security, 2002. ,