T. Antignac, D. Sands, and G. Schneider, Data Minimisation: a Language-Based Approach (Long Version). eprint arXiv:1611, p.5642, 2016.
DOI : 10.1007/978-3-319-58469-0_30

W. Ahrendt, T. Baar, B. Beckert, R. Bubel, M. Giese et al., The KeY tool, Software & Systems Modeling, vol.Patterns, issue.1, pp.32-54, 2005.
DOI : 10.1007/BFb0030541

N. Anciaux, B. Nguyen, and M. Vazirgiannis, Limiting data collection in application forms: A real-case application of a founding privacy principle, 2012 Tenth Annual International Conference on Privacy, Security and Trust, p.2012
DOI : 10.1109/PST.2012.6297920

URL : https://hal.archives-ouvertes.fr/hal-00768363

A. Askarov and A. Sabelfeld, Gradual Release: Unifying Declassification, Encryption and Key Release Policies, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007.
DOI : 10.1109/SP.2007.22

URL : http://www.cs.chalmers.se/~andrei/askarov-sabelfeld-sp07.pdf

A. Askarov and S. Chong, Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies, 2012 IEEE 25th Computer Security Foundations Symposium, 2012.
DOI : 10.1109/CSF.2012.31

URL : http://doi.org/10.1109/csf.2012.31

M. Backes, B. Kopf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1109/SP.2009.18

URL : http://www7.in.tum.de/~rybal/papers/sp09-discovery-and-quantification-of-information-leaks.pdf

M. Balliu, M. Dam, L. Guernic, and G. , Epistemic temporal logic for information flow security, Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, PLAS '11, 2011.
DOI : 10.1145/2166956.2166962

L. Bussard, Encyclopedia of Cryptography and Security, chap. Secondary Use Regulations, 2011.

S. Chong, Required Information Release, 2010 23rd IEEE Computer Security Foundations Symposium, 2010.
DOI : 10.1109/CSF.2010.22

URL : http://people.seas.harvard.edu/%7Echong/pubs/csf10_required_release_tr.pdf

E. Cohen, Information transmission in computational systems, SIGOPS Oper. Syst. Rev, vol.11, issue.5, 1977.

A. Dolzmann and T. Sturm, REDLOG, ACM SIGSAM Bulletin, vol.31, issue.2, pp.2-9, 1997.
DOI : 10.1145/261320.261324

C. Flanagan and S. Qadeer, Predicate abstraction for software verification, 2002.
DOI : 10.1145/503272.503291

R. Giacobazzi and F. Ranzato, Completeness in abstract interpretation: A domain perspective, AMAST, LNCS 1349 Springer, 1997.
DOI : 10.1007/BFb0000474

URL : http://www.math.unipd.it/~ranzato/papers/amast97.pdf

S. Gurses, C. Troncoso, and C. Diaz, Engineering privacy by design reloaded, 2015.

M. Hentschel, R. Bubel, and R. Hähnle, Symbolic execution debugger (sed) Runtime Verification, 2014.
DOI : 10.1007/978-3-319-11164-3_21

J. C. King, Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976.
DOI : 10.1145/360248.360252

J. Landauer and T. Redmond, A lattice of information. CSFW, 1993.

G. T. Leavens, A. L. Baker, and C. Ruby, JML, Proceedings of the Principles and Practices of Programming on The Java Platform, PPPJ '15, 1998.
DOI : 10.1145/2807426.2817926

G. Lowe, Quantifying information flow, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 2002.
DOI : 10.1109/CSFW.2002.1021804

URL : http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/capacity.ps

P. Malacaria, M. Tautchning, and D. Distefano, Information Leakage Analysis of Complex C Code and Its application to OpenSSL, LNCS, vol.21, issue.1, 2016.
DOI : 10.1145/2663716.2663758

I. Mastroeni and D. Zanardini, Data dependencies and program slicing, Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation , PEPM '08, 2008.
DOI : 10.1145/1328408.1328428

R. Mitchell, J. Mckim, and B. Meyer, Design by Contract, by Example, 2002.

O. Oystein, Theory of equivalence relations, Duke Mathematical Journal, vol.9, pp.573-627, 1942.

D. J. Richardson and L. A. Clarke, A partition analysis method to increase program reliability, 1981.

A. Sabelfeld and D. Sands, A Per Model of Secure Information Flow in Sequential Programs, Higher-Order and Symbolic Computation, 2001.
DOI : 10.1007/3-540-49099-X_4

G. Smith, On the Foundations of Quantitative Information Flow, FOSSACS LNCS, vol.38, issue.1, 2009.
DOI : 10.1137/060651380

M. C. Tschantz and J. M. Wing, Formal Methods for Privacy, in FM, 2009.
DOI : 10.1007/978-3-642-05089-3_1

C. G. Val, M. A. Enescu, S. Bayless, W. Aiello, and A. J. Hu, Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 2016.
DOI : 10.1109/EuroSP.2016.15