Composing Specifications, ACM Transactions on Programmming Languages and Systems, 1993. ,
Gradual Release: Unifying Declassification, Encryption and Key Release Policies, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.207-221, 2007. ,
DOI : 10.1109/SP.2007.22
Tight Enforcement of Information-Release Policies for Dynamic Languages, 2009 22nd IEEE Computer Security Foundations Symposium, pp.43-59, 2009. ,
DOI : 10.1109/CSF.2009.22
Efficient purely-dynamic information flow analysis, PLAS'09, pp.113-124, 2009. ,
Permissive dynamic information flow analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, pp.1-3, 2010. ,
DOI : 10.1145/1814217.1814220
Multiple facets for dynamic information flow, Proc. of the 39th Symposium of Principles of Programming Languages, 2012. ,
Edit Automata: Enforcement Mechanisms for Run-time Security Policies, International Journal of Information Security, vol.4, issue.1 2, pp.2-16, 2005. ,
Hybrid Information Flow Monitoring against Web Tracking, 2013 IEEE 26th Computer Security Foundations Symposium, pp.240-254, 2013. ,
DOI : 10.1109/CSF.2013.23
URL : https://hal.archives-ouvertes.fr/hal-00924138
Generalizing permissiveupgrade in dynamic information flow analysis, Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS'14, pp.15-1524, 2014. ,
Non-interference through secure multi-execution, Proc. of the 2010 Symposium on Security and Privacy, pp.109-124, 2010. ,
The Inlined Reference Monitor Approach to Security Policy Enforcement, 2003. ,
Automata-Based Confidentiality Monitoring, Proc. of the 11th Asian Computing Science Conference, pp.75-89, 2006. ,
DOI : 10.1007/11555827_21
URL : https://hal.archives-ouvertes.fr/inria-00130210
Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, vol.28, issue.1, pp.175-205, 2006. ,
DOI : 10.1145/1111596.1111601
Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language, 2015 IEEE 28th Computer Security Foundations Symposium, 2015. ,
DOI : 10.1109/CSF.2015.31
Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, pp.3-18, 2012. ,
DOI : 10.1109/CSF.2012.19
On flow-sensitive security types, POPL'06, pp.79-90, 2006. ,
Confidentiality Enforcement Using Dynamic Information Flow Analyses, 2007. ,
URL : https://hal.archives-ouvertes.fr/tel-00198621
Precise Dynamic Verification of Confidentiality, Proc. of the 5th International Verification Workshop, pp.82-96, 2008. ,
Automata-based Confidentiality Monitoring, Proc. of the Annual Asian Computing Science Conference, pp.75-89, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00130210
Enforcing Non-safety Security Policies with Program Monitors, ESORICS 05, 2005. ,
DOI : 10.1007/11555827_21
An Information Flow Monitor for a Core of DOM -Introducing References and Live Primitives, Trustworthy Global Computing -9th International Symposium, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01087375
A general theory of composition for a class of "possibilistic" properties, IEEE Transactions on Software Engineering, vol.22, issue.1, 1996. ,
DOI : 10.1109/32.481534
Dynamic vs. Static Flow-Sensitive Security Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.186-199, 2010. ,
DOI : 10.1109/CSF.2010.20
Declassification: Dimensions and principles, Journal of Computer Security, vol.17, issue.5, pp.517-548, 2009. ,
DOI : 10.3233/JCS-2009-0352
An Information Flow Monitor-Inlining Compiler for Securing a Core of JavaScript, ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, 2014. ,
DOI : 10.1007/978-3-642-55415-5_23
URL : https://hal.archives-ouvertes.fr/hal-01087374
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
Secure Information Flow as a Safety Problem, Static Analysis, 12th International Symposium, pp.352-367, 2005. ,
DOI : 10.1007/11547662_24
Eliminating covert flows with minimum typings, Proceedings 10th Computer Security Foundations Workshop, pp.156-168, 1997. ,
DOI : 10.1109/CSFW.1997.596807
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304
Precise Enforcement of Confidentiality for Reactive Systems, 2013 IEEE 26th Computer Security Foundations Symposium, pp.18-32, 2013. ,
DOI : 10.1109/CSF.2013.9
Programming languages for information security, 2002. ,