G. Boudol, Secure Information Flow as a Safety Property, Formal Aspects in Security and Trust, 5th International Workshop, FAST, pp.20-34, 2008.

W. Cheng, D. R. Ports, D. A. Schultz, V. Popic, A. Blankstein et al., Abstractions for Usable Information Flow Control in Aeolus, pp.139-151, 2012.

A. Cortesi, P. Ferrara, R. Halder, and M. Zanioli, Combining symbolic and numerical domains for information leakage analysis, Trans. Computational Science, vol.31, pp.98-135, 2018.

A. Cortesi, P. Ferrara, M. Pistoia, and O. Tripp, Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications, Verification, Model Checking, and Abstract Interpretation -16th International Conference, VMCAI 2015, pp.61-79, 2015.

P. Cousot, Types as Abstract Interpretations, Conference Record of POPL'97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.316-331, 1997.

S. Deng, D. Gümüsoglu, W. Xiong, Y. S. Gener, O. Demir et al., SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures. IACR Cryptology ePrint Archive, vol.193, 2017.

D. E. Denning, A Lattice Model of Secure Information Flow, Commun. ACM, vol.19, issue.5, pp.236-243, 1976.

P. Efstathopoulos, M. N. Krohn, S. Vandebogart, C. Frey, D. Ziegler et al., Labels and event processes in the Asbestos operating system, Proceedings of the 20th ACM Symposium on Operating Systems Principles, pp.17-30, 2005.

A. Ferraiuolo, M. Zhao, A. C. Myers, and G. E. Suh, Hyperflow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security, pp.1583-1600, 2018.

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.

M. Huth, On the equivalence of state-transition systems, Theory and Formal Methods, pp.171-182, 1993.

M. N. Krohn, A. Yip, M. Z. Brodsky, N. Cliffer, M. F. Kaashoek et al., Information flow control for standard OS abstractions, Proceedings of the 21st ACM Symposium on Operating Systems Principles, pp.321-334, 2007.

J. Liu, O. Arden, M. D. George, and A. C. Myers, Fabric: Building open distributed systems securely by construction, Journal of Computer Security, vol.25, issue.4-5, pp.367-426, 2017.

J. Liu, M. D. George, K. Vikram, X. Qi, L. Waye et al., Fabric: a platform for secure distributed computation and storage, Proceedings of the 22nd ACM Symposium on Operating Systems Principles, pp.321-334, 2009.

L. Lourenço and L. Caires, Dependent information flow types, Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.317-328, 2015.

A. Melton, B. S. Schröder, and G. E. Strecker, Lagois Connections -a Counterpart to Galois Connections, Theor. Comput. Sci, vol.136, issue.1, pp.79-107, 1994.

A. C. Myers, Jflow: Practical mostly-static information flow control, POPL '99, Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.228-241, 1999.

A. C. Myers, Mostly-static decentralized information flow control, 1999.

F. Pottier and V. Simonet, Information Flow Inference for ML, ACM Trans. Program. Lang. Syst, vol.25, issue.1, pp.117-158, 2003.

I. Roy, D. E. Porter, M. D. Bond, K. S. Mckinley, and E. Witchel, Laminar: practical fine-grained decentralized information flow control, Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI, pp.63-74, 2009.

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.

D. A. Schultz and B. Liskov, IFDB: Decentralized Information Flow Control for Databases, Eighth Eurosys Conference 2013, EuroSys '13, pp.43-56, 2013.

D. M. Volpano, C. E. Irvine, and G. Smith, A Sound Type System for Secure Flow Analysis, Journal of Computer Security, vol.4, issue.2/3, pp.167-188, 1996.

M. Zanotti, Security Typings by Abstract Interpretation, Static Analysis, 9th International Symposium, pp.360-375, 2002.

N. Zeldovich, S. Boyd-wickizer, E. Kohler, and D. Mazières, Making Information Flow Explicit in Histar, 7th Symposium on Operating Systems Design and Implementation (OSDI'06), pp.263-278, 2006.

N. Zeldovich, S. Boyd-wickizer, and D. Mazières, Securing Distributed Systems with Information Flow Control, 5th USENIX Symposium on Networked Systems Design & Implementation, NSDI, pp.293-308, 2008.

D. Zhang, Y. Wang, G. E. Suh, and A. C. Myers, A Hardware Design Language for Timing-Sensitive Information-Flow Security, Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '15, pp.503-516, 2015.