A. Askarov, S. Hunt, A. Sabelfeld, and D. Sands, Termination-Insensitive Noninterference Leaks More Than Just a Bit, Computer Security -ESORICS 2008, 13th European Symposium on Research in Computer Security. Proceedings, p.333348, 2008.
DOI : 10.3233/JCS-1996-42-304

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.573

G. Barthe, P. R. Argenio, and T. Rezk, Secure information ow by selfcomposition, Mathematical Structures in Computer Science, vol.21, issue.6, p.12071252, 2011.

N. Bielova and T. Rezk, A taxonomy of information ow monitors, Principles of Security and Trust -5th International Conference Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016 Proceedings, p.4667, 2016.

A. Charguéraud, Pretty-Big-Step Semantics, Programming Languages and Systems - 22nd European Symposium on Programming, ESOP 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013. Proceedings, p.4160, 2013.
DOI : 10.1007/978-3-642-37036-6_3

E. Cohen, Information transmission in computational systems, Proceedings of the Sixth ACM Symposium on Operating Systems Principles, SOSP '77, p.133139, 1977.

E. Dorothy, P. J. Denning, and . Denning, Certication of programs for secure information ow, Commun. ACM, vol.20, issue.7, p.504513, 1977.

A. Joseph, J. Goguen, and . Meseguer, Security policies and security models, IEEE Symposium on Security and Privacy, p.1120, 1982.

S. Hunt and D. Sands, On ow-sensitive security types, Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, p.7990, 2006.
DOI : 10.1145/1111320.1111045

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.4867

V. Kashyap, B. Wiedermann, and B. Hardekopf, Timing-and termination-sensitive secure information ow: Exploring a new approach, 32nd IEEE Symposium on Security and Privacy, p.413428, 2011.
DOI : 10.1109/sp.2011.19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.352.9921

G. Gurvan-le, Condentiality Enforcement Using Dynamic Information Flow Analyses, 2007.

A. Russo and A. Sabelfeld, Dynamic vs. static ow-sensitive security analysis, Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, p.186199, 2010.

A. Sabelfeld and A. C. Myers, Language-based information-ow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, p.519, 2003.

A. Sabelfeld and A. Russo, From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research, Perspectives of Systems Informatics, 7th International Andrei Ershov Memorial Conference, p.352365, 2009.
DOI : 10.1007/978-3-642-11486-1_30