Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Gradual Release: Unifying Declassification, Encryption and Key Release Policies, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.207-221, 2007. ,
DOI : 10.1109/SP.2007.22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.3472
Permissive dynamic information flow analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, pp.1-3, 2010. ,
DOI : 10.1145/1814217.1814220
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.9422
Multiple facets for dynamic information flow, Proc. of the 39th Symposium of Principles of Programming Languages, 2012. ,
DOI : 10.1145/2103656.2103677
Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009. ,
DOI : 10.1109/SP.2009.18
Hybrid Information Flow Monitoring against Web Tracking, 2013 IEEE 26th Computer Security Foundations Symposium, pp.240-254, 2013. ,
DOI : 10.1109/CSF.2013.23
URL : https://hal.archives-ouvertes.fr/hal-00924138
Hybrid information flow monitoring of attacker knowledge, IEEE Computer Security Foundations Symposium, CSF'16, pp.225-238, 2016. ,
A Taxonomy of Information Flow Monitors, International Conference on Principles of Security and Trust, pp.46-67, 2016. ,
DOI : 10.3233/JCS-1996-42-304
URL : https://hal.archives-ouvertes.fr/hal-01348188
Quantifying information flow with beliefs, Journal of Computer Security, vol.17, issue.5, pp.655-701, 2009. ,
DOI : 10.3233/JCS-2009-0353
URL : http://doi.org/10.3233/jcs-2009-0353
Non-interference through secure multi-execution, Proc. of the 2010 Symposium on Security and Privacy, pp.109-124, 2010. ,
DOI : 10.1109/sp.2010.15
URL : https://lirias.kuleuven.be/bitstream/123456789/265429/1/secure-multi-execution-final.pdf
Min-entropy as a resource, Information and Computation, vol.226, pp.57-75, 2013. ,
DOI : 10.1016/j.ic.2013.03.005
Information and Coding Theory, 2000. ,
Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language, 2015 IEEE 28th Computer Security Foundations Symposium, 2015. ,
DOI : 10.1109/CSF.2015.31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.697.2754
Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, pp.3-18, 2012. ,
DOI : 10.1109/CSF.2012.19
Approximation and Randomization for Quantitative Information-Flow Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.3-14, 2010. ,
DOI : 10.1109/CSF.2010.8
Dynamic Enforcement of Knowledge-Based Security Policies, 2011 IEEE 24th Computer Security Foundations Symposium, pp.114-128, 2011. ,
DOI : 10.1109/CSF.2011.15
Quantitative information flow as network flow capacity, Proc. of the ACM 2008 Conf. on Programming Language Design and Implementation, pp.193-205, 2008. ,
Hybrid typing of secure information flow in a javascript-like language, Trustworthy Global Computing TGC'15, pp.63-78, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01243029
On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Quantifying Information Flow Using Min-Entropy, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.159-167, 2011. ,
DOI : 10.1109/QEST.2011.31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.8523
Programming languages for information security, 2002. ,