M. Abadi and L. Lamport, Composing Specifications, ACM Transactions on Programmming Languages and Systems, 1993.

A. Askarov and A. Sabelfeld, Gradual Release: Unifying Declassification, Encryption and Key Release Policies, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.207-221, 2007.
DOI : 10.1109/SP.2007.22

A. Askarov and A. Sabelfeld, Tight Enforcement of Information-Release Policies for Dynamic Languages, 2009 22nd IEEE Computer Security Foundations Symposium, pp.43-59, 2009.
DOI : 10.1109/CSF.2009.22

T. H. Austin and C. Flanagan, Efficient purely-dynamic information flow analysis, PLAS'09, pp.113-124, 2009.

T. H. Austin and C. Flanagan, Permissive dynamic information flow analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, pp.1-3, 2010.
DOI : 10.1145/1814217.1814220

T. H. Austin and C. Flanagan, Multiple facets for dynamic information flow, Proc. of the 39th Symposium of Principles of Programming Languages, 2012.

L. Bauer, J. Ligatti, and D. Walker, Edit Automata: Enforcement Mechanisms for Run-time Security Policies, International Journal of Information Security, vol.4, issue.1 2, pp.2-16, 2005.

F. Besson, N. Bielova, and T. Jensen, Hybrid Information Flow Monitoring against Web Tracking, 2013 IEEE 26th Computer Security Foundations Symposium, pp.240-254, 2013.
DOI : 10.1109/CSF.2013.23

URL : https://hal.archives-ouvertes.fr/hal-00924138

A. Bichhawat, V. Rajani, D. Garg, and C. Hammer, Generalizing permissiveupgrade in dynamic information flow analysis, Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS'14, pp.15-1524, 2014.

D. Devriese and F. Piessens, Non-interference through secure multi-execution, Proc. of the 2010 Symposium on Security and Privacy, pp.109-124, 2010.

U. Erlingsson, The Inlined Reference Monitor Approach to Security Policy Enforcement, 2003.

G. L. Guernic, A. Banerjee, T. Jensen, and D. A. Schmidt, Automata-Based Confidentiality Monitoring, Proc. of the 11th Asian Computing Science Conference, pp.75-89, 2006.
DOI : 10.1007/11555827_21

URL : https://hal.archives-ouvertes.fr/inria-00130210

K. W. Hamlen, G. Morrisett, and F. B. Schneider, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006.
DOI : 10.1145/1111596.1111601

D. Hedin, L. Bello, and A. Sabelfeld, Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language, 2015 IEEE 28th Computer Security Foundations Symposium, 2015.
DOI : 10.1109/CSF.2015.31

D. Hedin and A. Sabelfeld, Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, pp.3-18, 2012.
DOI : 10.1109/CSF.2012.19

S. Hunt and D. Sands, On flow-sensitive security types, POPL'06, pp.79-90, 2006.

G. and L. Guernic, Confidentiality Enforcement Using Dynamic Information Flow Analyses, 2007.
URL : https://hal.archives-ouvertes.fr/tel-00198621

G. and L. Guernic, Precise Dynamic Verification of Confidentiality, Proc. of the 5th International Verification Workshop, pp.82-96, 2008.

G. , L. Guernic, A. Banerjee, T. Jensen, and D. Schmidt, Automata-based Confidentiality Monitoring, Proc. of the Annual Asian Computing Science Conference, pp.75-89, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00130210

J. Ligatti, L. Bauer, and D. Walker, Enforcing Non-safety Security Policies with Program Monitors, ESORICS 05, 2005.
DOI : 10.1007/11555827_21

A. G. Matos, J. F. Santos, and T. Rezk, An Information Flow Monitor for a Core of DOM -Introducing References and Live Primitives, Trustworthy Global Computing -9th International Symposium, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01087375

J. Mclean, A general theory of composition for a class of "possibilistic" properties, IEEE Transactions on Software Engineering, vol.22, issue.1, 1996.
DOI : 10.1109/32.481534

A. Russo and A. Sabelfeld, Dynamic vs. Static Flow-Sensitive Security Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.186-199, 2010.
DOI : 10.1109/CSF.2010.20

A. Sabelfeld and D. Sands, Declassification: Dimensions and principles, Journal of Computer Security, vol.17, issue.5, pp.517-548, 2009.
DOI : 10.3233/JCS-2009-0352

J. F. Santos and T. Rezk, An Information Flow Monitor-Inlining Compiler for Securing a Core of JavaScript, ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, 2014.
DOI : 10.1007/978-3-642-55415-5_23

URL : https://hal.archives-ouvertes.fr/hal-01087374

F. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

T. Terauchi and A. Aiken, Secure Information Flow as a Safety Problem, Static Analysis, 12th International Symposium, pp.352-367, 2005.
DOI : 10.1007/11547662_24

D. Volpano and G. Smith, Eliminating covert flows with minimum typings, Proceedings 10th Computer Security Foundations Workshop, pp.156-168, 1997.
DOI : 10.1109/CSFW.1997.596807

D. Volpano, G. Smith, and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.
DOI : 10.3233/JCS-1996-42-304

D. Zanarini, M. Jaskelioff, and A. Russo, Precise Enforcement of Confidentiality for Reactive Systems, 2013 IEEE 26th Computer Security Foundations Symposium, pp.18-32, 2013.
DOI : 10.1109/CSF.2013.9

S. A. Zdancewic, Programming languages for information security, 2002.