M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

A. Askarov and A. Sabelfeld, Gradual Release: Unifying Declassification, Encryption and Key Release Policies, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.207-221, 2007.
DOI : 10.1109/SP.2007.22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.3472

T. H. Austin and C. Flanagan, Permissive dynamic information flow analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, pp.1-3, 2010.
DOI : 10.1145/1814217.1814220

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.9422

T. H. Austin and C. Flanagan, Multiple facets for dynamic information flow, Proc. of the 39th Symposium of Principles of Programming Languages, 2012.
DOI : 10.1145/2103656.2103677

M. Backes, B. Köpf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009.
DOI : 10.1109/SP.2009.18

F. Besson, N. Bielova, and T. Jensen, Hybrid Information Flow Monitoring against Web Tracking, 2013 IEEE 26th Computer Security Foundations Symposium, pp.240-254, 2013.
DOI : 10.1109/CSF.2013.23

URL : https://hal.archives-ouvertes.fr/hal-00924138

F. Besson, N. Bielova, and T. Jensen, Hybrid information flow monitoring of attacker knowledge, IEEE Computer Security Foundations Symposium, CSF'16, pp.225-238, 2016.

N. Bielova and T. Rezk, A Taxonomy of Information Flow Monitors, International Conference on Principles of Security and Trust, pp.46-67, 2016.
DOI : 10.3233/JCS-1996-42-304

URL : https://hal.archives-ouvertes.fr/hal-01348188

M. R. Clarkson, A. C. Myers, and F. B. Schneider, Quantifying information flow with beliefs, Journal of Computer Security, vol.17, issue.5, pp.655-701, 2009.
DOI : 10.3233/JCS-2009-0353

URL : http://doi.org/10.3233/jcs-2009-0353

D. Devriese and F. Piessens, Non-interference through secure multi-execution, Proc. of the 2010 Symposium on Security and Privacy, pp.109-124, 2010.
DOI : 10.1109/sp.2010.15

URL : https://lirias.kuleuven.be/bitstream/123456789/265429/1/secure-multi-execution-final.pdf

B. Espinoza and G. Smith, Min-entropy as a resource, Information and Computation, vol.226, pp.57-75, 2013.
DOI : 10.1016/j.ic.2013.03.005

A. Gareth, J. M. Jones, and . Jones, Information and Coding Theory, 2000.

D. Hedin, L. Bello, and A. Sabelfeld, Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language, 2015 IEEE 28th Computer Security Foundations Symposium, 2015.
DOI : 10.1109/CSF.2015.31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.697.2754

D. Hedin and A. Sabelfeld, Information-Flow Security for a Core of JavaScript, 2012 IEEE 25th Computer Security Foundations Symposium, pp.3-18, 2012.
DOI : 10.1109/CSF.2012.19

B. Köpf and A. Rybalchenko, Approximation and Randomization for Quantitative Information-Flow Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.3-14, 2010.
DOI : 10.1109/CSF.2010.8

P. Mardziel, S. Magill, M. Hicks, and M. Srivatsa, Dynamic Enforcement of Knowledge-Based Security Policies, 2011 IEEE 24th Computer Security Foundations Symposium, pp.114-128, 2011.
DOI : 10.1109/CSF.2011.15

S. Mccamant and M. D. Ernst, Quantitative information flow as network flow capacity, Proc. of the ACM 2008 Conf. on Programming Language Design and Implementation, pp.193-205, 2008.

J. F. Santos, T. Jensen, T. Rezk, and A. Schmitt, Hybrid typing of secure information flow in a javascript-like language, Trustworthy Global Computing TGC'15, pp.63-78, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01243029

G. Smith, On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, pp.288-302, 2009.
DOI : 10.1137/060651380

G. Smith, Quantifying Information Flow Using Min-Entropy, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.159-167, 2011.
DOI : 10.1109/QEST.2011.31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.8523

S. A. Zdancewic, Programming languages for information security, 2002.