L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat, Practical Domain and Type Enforcement for UNIX, Proceedings 1995 IEEE Symposium on Security and Privacy, pp.66-77, 1995.
DOI : 10.1109/SECPRI.1995.398923

D. E. Bell and L. J. Lapadula, Secure computer systems: Mathematical foundations, Tech. rep., DTIC Document, 1973.

W. Boebert, W. Young, R. Kaln, and S. Hansohn, Secure Ada Target: Issues, System Design, and Verification, 1985 IEEE Symposium on Security and Privacy, p.IEEE S&P, 1985.
DOI : 10.1109/SP.1985.10022

W. E. Boebert and R. Y. Kain, A further note on the confinement problem, Proceedings of IEEE International Carnahan Conference on Security Technology, pp.198-202, 1996.
DOI : 10.1109/CCST.1996.551864

A. D. Brucker and H. Petritsch, Extending access control models with break-glass, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.197-206, 2009.
DOI : 10.1145/1542207.1542239

URL : http://epub.uni-regensburg.de/8625/1/petritsch.pdf

W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige, TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting, 11th IEEE Symposium on Computers and Communications (ISCC'06), pp.749-754, 2006.
DOI : 10.1109/ISCC.2006.158

URL : http://people.csail.mit.edu/qin_zhao/papers/zhao-iscc06-tainttrace.pdf

J. Clause, W. Li, and A. Orso, Dytan, Proceedings of the 2007 international symposium on Software testing and analysis, ISSTA '07, pp.196-206, 2007.
DOI : 10.1145/1273463.1273490

J. Crampton, Cryptographic Enforcement of Role-Based Access Control, Lecture Notes in Computer Science, vol.29, issue.2, pp.191-205, 2011.
DOI : 10.1109/2.485845

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

P. Efstathopoulos, M. Krohn, S. Vandebogart, C. Frey, D. Ziegler et al., Labels and event processes in the asbestos operating system, In: SOSP, vol.5, pp.17-30, 2005.

W. Enck, P. Gilbert, B. G. Chun, L. P. Cox, J. Jung et al., TaintDroid, ACM Transactions on Computer Systems, vol.32, issue.2, pp.255-270, 2010.
DOI : 10.1145/1629575.1629604

A. Ene, W. Horne, N. Milosavljevic, P. Rao, R. Schreiber et al., Fast exact and heuristic methods for role minimization problems. SACMAT pp, pp.1-10, 2008.
DOI : 10.1145/1377836.1377838

A. Ferrara, G. Fuchsbauer, and B. Warinschi, Cryptographically Enforced RBAC, 2013 IEEE 26th Computer Security Foundations Symposium, pp.115-129, 2013.
DOI : 10.1109/CSF.2013.15

J. Flum and M. Grohe, Parameterized Complexity Theory (Texts in Theoretical Computer Science . An EATCS Series), 2006.

L. Gong and X. Qian, The complexity and composability of secure interoperation, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp.190-200, 1994.
DOI : 10.1109/RISP.1994.296581

V. Haldar, D. Chandra, and M. Franz, Dynamic Taint Propagation for Java, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.303-311, 2005.
DOI : 10.1109/CSAC.2005.21

M. Jaume, V. V. Tong, and L. Mé, Flow Based Interpretation of Access Control: Detection of Illegal Information Flows, pp.72-86, 2011.
DOI : 10.1007/978-3-540-39650-5_17

URL : https://hal.archives-ouvertes.fr/hal-00647170

M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek et al., Information flow control for standard OS abstractions, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.321-334, 2007.
DOI : 10.1145/1323293.1294293

URL : http://www.pdos.csail.mit.edu/~max/docs/flume.pdf

L. C. Lam and T. Chiueh, A General Dynamic Information Flow Tracking Framework for Security Applications, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.463-472, 2006.
DOI : 10.1109/ACSAC.2006.6

B. W. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

Z. Mao, N. Li, H. Chen, and X. Jiang, Trojan horse resistant discretionary access control, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.237-246, 2009.
DOI : 10.1145/1542207.1542244

URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2008-8.pdf

Z. Mao, N. Li, H. Chen, and X. Jiang, Combining Discretionary Policy with Mandatory Information Flow in Operating Systems, ACM Transactions on Information and System Security, vol.14, issue.3, pp.1-2427, 2011.
DOI : 10.1145/2043621.2043624

S. Marinovic, R. Craven, J. Ma, and N. Dulay, Rumpole, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.73-82, 2011.
DOI : 10.1145/1998441.1998453

A. C. Myers and B. Liskov, A decentralized model for information flow control, ACM SIGOPS Operating Systems Review, vol.31, issue.5, pp.129-142, 1997.
DOI : 10.1145/269005.266669

H. Petritsch, Break-Glass: Handling Exceptional Situations in Access Control, 2014.
DOI : 10.1007/978-3-658-07365-7

W. K. Sze, B. Mital, and R. Sekar, Towards more usable information flow policies for contemporary operating systems, Proceedings of the 19th ACM symposium on Access control models and technologies, SACMAT '14, p.SACMAT, 2014.
DOI : 10.1145/2613087.2613110

W. K. Sze and R. Sekar, Provenance-based Integrity Protection for Windows, Proceedings of the 31st Annual Computer Security Applications Conference on, ACSAC 2015, pp.211-220, 2015.
DOI : 10.1145/1029894.1029913

M. Yannakakis, R. J. Lipton, W. A. Burkhard, W. J. Savitch, E. P. Friedman et al., Node-and edge-deletion NP-complete problems, Proceedings of the tenth annual ACM symposium on Theory of computing , STOC '78, pp.253-264, 1978.
DOI : 10.1145/800133.804355

M. Yannakakis, Edge-Deletion Problems, SIAM Journal on Computing, vol.10, issue.2, pp.297-309, 1981.
DOI : 10.1137/0210021

D. Zhang, K. Ramamohanrao, and T. Ebringer, Role engineering using graph optimisation. SACMAT pp, pp.139-144, 2007.
DOI : 10.1145/1266840.1266862

Y. Zhu, J. Jung, D. Song, T. Kohno, and D. Wetherall, Privacy Scope: A Precise information flow tracking system for finding application leaks, 2009.

J. Zimmermann, L. Mé, and C. Bidan, An improved reference flow control model for policybased intrusion detection, ESORICS, pp.291-308, 2003.
DOI : 10.1007/978-3-540-39650-5_17

URL : https://hal.archives-ouvertes.fr/hal-00356444