A. Askarov and S. Chong, Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies, 2012 IEEE 25th Computer Security Foundations Symposium, pp.308-322, 2012.
DOI : 10.1109/CSF.2012.31

A. Askarov and A. Sabelfeld, Gradual Release: Unifying Declassification, Encryption and Key Release Policies, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.207-221, 2007.
DOI : 10.1109/SP.2007.22

T. H. Austin and C. Flanagan, Efficient purely-dynamic information flow analysis, PLAS'09, pp.113-124, 2009.

T. H. Austin and C. Flanagan, Permissive dynamic information flow analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, pp.1-3, 2010.
DOI : 10.1145/1814217.1814220

A. Barth, C. Jackson, and J. C. Mitchell, Securing frame communication in browsers, Communications of the ACM, vol.52, issue.6, pp.83-91, 2009.
DOI : 10.1145/1516046.1516066

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.3290

F. Besson, N. Bielova, and T. Jensen, Hybrid Information Flow Monitoring against Web Tracking, 2013 IEEE 26th Computer Security Foundations Symposium, pp.240-254, 2013.
DOI : 10.1109/CSF.2013.23

URL : https://hal.archives-ouvertes.fr/hal-00924138

S. Chong, Required Information Release, 2010 23rd IEEE Computer Security Foundations Symposium, pp.637-676, 2012.
DOI : 10.1109/CSF.2010.22

A. Chudnov, G. Kuan, and D. A. Naumann, Information Flow Monitoring as Abstract Interpretation for Relational Logic, 2014 IEEE 27th Computer Security Foundations Symposium, pp.48-62, 2014.
DOI : 10.1109/CSF.2014.12

A. Chudnov and D. A. Naumann, Information Flow Monitor Inlining, 2010 23rd IEEE Computer Security Foundations Symposium, pp.200-214, 2010.
DOI : 10.1109/CSF.2010.21

J. S. Fenton, Memoryless subsystems, The Computer Journal, vol.17, issue.2, pp.143-147, 1974.
DOI : 10.1093/comjnl/17.2.143

D. Hedin, L. Bello, and A. Sabelfeld, Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language, 2015 IEEE 28th Computer Security Foundations Symposium, 2015.
DOI : 10.1109/CSF.2015.31

D. Hedin, A. Birgisson, L. Bello, and A. Sabelfeld, JSFlow, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1663-1671, 2014.
DOI : 10.1145/2554850.2554909

D. Hedin and A. Sabelfeld, Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, pp.3-18, 2012.
DOI : 10.1109/CSF.2012.19

S. Hunt and D. Sands, On flow-sensitive security types, POPL'06, pp.79-90, 2006.

J. Landauer and T. Redmond, A lattice of information, [1993] Proceedings Computer Security Foundations Workshop VI, pp.65-70, 1993.
DOI : 10.1109/CSFW.1993.246638

G. , L. Guernic, A. Banerjee, T. Jensen, and D. Schmidt, Automata-based Confidentiality Monitoring, ASIAN'06, pp.75-89, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00130210

J. Magazinius, A. Russo, and A. Sabelfeld, On-the-fly inlining of dynamic security monitors, SEC'10, pp.173-186, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01054519

S. Moore and S. Chong, Static Analysis for Efficient Hybrid Information-Flow Control, 2011 IEEE 24th Computer Security Foundations Symposium, pp.146-160, 2011.
DOI : 10.1109/CSF.2011.17

C. Müller, M. Kovács, and H. Seidl, An Analysis of Universal Information Flow Based on Self-Composition, 2015 IEEE 28th Computer Security Foundations Symposium, 2015.
DOI : 10.1109/CSF.2015.33

A. Russo and A. Sabelfeld, Dynamic vs. Static Flow-Sensitive Security Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.186-199, 2010.
DOI : 10.1109/CSF.2010.20

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

S. A. Zdancewic, Programming languages for information security, 2002.