Analysis and caching of dependencies, Proc. ACM International Conf. on Functional Programming, pp.83-91, 1996. ,
Using access control for secure information flow in a Java-like language, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.155-169, 2003. ,
DOI : 10.1109/CSFW.2003.1212711
Secure computer systems: A mathematical model, MITRE Corp. Reprinted in J. of Computer Security, vol.2, issue.4, pp.2-3, 1973. ,
A minimal trusted computing base for dynamically ensuring secure information flow, 2001. ,
Information flow for Algol-like languages, Computer Languages, Systems & Structures, vol.28, issue.1, pp.3-28, 2002. ,
DOI : 10.1016/S0096-0551(02)00006-1
Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977. ,
DOI : 10.1145/359636.359712
Memoryless subsystems, The Computer Journal, vol.17, issue.2, pp.143-147, 1974. ,
DOI : 10.1093/comjnl/17.2.143
Labeled lambda-calculus and a generalized notion of strictness (an extended abstract), Proc. Asian C. S. Conf. on Algorithms, Concurrency and Knowledge, pp.103-110, 1995. ,
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
A security flow control algorithm and its denotational semantics correctness proof, Formal Aspects of Computing, vol.69, issue.2, pp.727-754, 1992. ,
DOI : 10.1007/BF03180570
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999. ,
DOI : 10.1145/292540.292561
Mostly-Static Decentralized Information Flow Control, 1999. ,
Complete, safe information flow with decentralized labels, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.186-197, 1998. ,
DOI : 10.1109/SECPRI.1998.674834
Jif: Java information flow, 2001. ,
Flow Logic: A Multi-paradigmatic Approach to Static Analysis, The Essence of Computation, pp.223-244, 2002. ,
DOI : 10.1007/3-540-36377-7_11
Information flow inference for free, Proc. ACM International Conf. on Functional Programming, pp.46-57, 2000. ,
Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003. ,
DOI : 10.1145/596980.596983
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.6266
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979
Fine-grained information flow analysis for a ~ -calculus with sum types, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.223-237, 2002. ,
DOI : 10.1109/CSFW.2002.1021818
Secure program execution via dynamic information flow tracking, Proc. Int. Conf. Architectural Support for Programming Languages and Operating Systems, pp.85-96, 2004. ,
DOI : 10.1145/1024393.1024404
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.341
A type-based approach to program security, Proc. Theory and Practice of Software Development, pp.607-621, 1997. ,
DOI : 10.1007/BFb0030629
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304
Programming Perl, 2000. ,
Security controls in the adept-50 timesharing system, Proc. AFIPS Fall Joint Computer Conf, pp.119-133, 1969. ,
Exploiting the Dual Nature of Sensitivity Labels, 1987 IEEE Symposium on Security and Privacy, pp.23-31, 1987. ,
DOI : 10.1109/SP.1987.10016
Robust declassification, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.15-23, 2001. ,
DOI : 10.1109/CSFW.2001.930133
Dynamic security labels and noninterference, Proc. Workshop Formal Aspects in Security and Trust, 2004. ,