M. Abadi, B. Lampson, and J. Lévy, Analysis and caching of dependencies, Proc. ACM International Conf. on Functional Programming, pp.83-91, 1996.

A. Banerjee and D. A. Naumann, Using access control for secure information flow in a Java-like language, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.155-169, 2003.
DOI : 10.1109/CSFW.2003.1212711

D. E. Bell and L. J. Lapadula, Secure computer systems: A mathematical model, MITRE Corp. Reprinted in J. of Computer Security, vol.2, issue.4, pp.2-3, 1973.

J. Brown, T. F. Knight, and J. , A minimal trusted computing base for dynamically ensuring secure information flow, 2001.

D. Clark, C. Hankin, and S. Hunt, Information flow for Algol-like languages, Computer Languages, Systems & Structures, vol.28, issue.1, pp.3-28, 2002.
DOI : 10.1016/S0096-0551(02)00006-1

D. E. Denning and P. J. Denning, Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977.
DOI : 10.1145/359636.359712

J. S. Fenton, Memoryless subsystems, The Computer Journal, vol.17, issue.2, pp.143-147, 1974.
DOI : 10.1093/comjnl/17.2.143

M. Gandhe, G. Venkatesh, and A. Sanyal, Labeled lambda-calculus and a generalized notion of strictness (an extended abstract), Proc. Asian C. S. Conf. on Algorithms, Concurrency and Knowledge, pp.103-110, 1995.

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

M. Mizuno and D. Schmidt, A security flow control algorithm and its denotational semantics correctness proof, Formal Aspects of Computing, vol.69, issue.2, pp.727-754, 1992.
DOI : 10.1007/BF03180570

A. C. Myers, JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999.
DOI : 10.1145/292540.292561

A. C. Myers, Mostly-Static Decentralized Information Flow Control, 1999.

A. C. Myers and B. Liskov, Complete, safe information flow with decentralized labels, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.186-197, 1998.
DOI : 10.1109/SECPRI.1998.674834

A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic, Jif: Java information flow, 2001.

H. R. Nielson and F. Nielson, Flow Logic: A Multi-paradigmatic Approach to Static Analysis, The Essence of Computation, pp.223-244, 2002.
DOI : 10.1007/3-540-36377-7_11

F. Pottier and S. Conchon, Information flow inference for free, Proc. ACM International Conf. on Functional Programming, pp.46-57, 2000.

F. Pottier and V. Simonet, Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003.
DOI : 10.1145/596980.596983

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.6266

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979

V. Simonet, Fine-grained information flow analysis for a ~ -calculus with sum types, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pp.223-237, 2002.
DOI : 10.1109/CSFW.2002.1021818

G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas, Secure program execution via dynamic information flow tracking, Proc. Int. Conf. Architectural Support for Programming Languages and Operating Systems, pp.85-96, 2004.
DOI : 10.1145/1024393.1024404

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.341

D. Volpano and G. Smith, A type-based approach to program security, Proc. Theory and Practice of Software Development, pp.607-621, 1997.
DOI : 10.1007/BFb0030629

D. Volpano, G. Smith, and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.
DOI : 10.3233/JCS-1996-42-304

L. Wall, T. Christiansen, and J. Orwant, Programming Perl, 2000.

C. Weissman, Security controls in the adept-50 timesharing system, Proc. AFIPS Fall Joint Computer Conf, pp.119-133, 1969.

J. P. Woodward, Exploiting the Dual Nature of Sensitivity Labels, 1987 IEEE Symposium on Security and Privacy, pp.23-31, 1987.
DOI : 10.1109/SP.1987.10016

S. Zdancewic and A. C. Myers, Robust declassification, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.15-23, 2001.
DOI : 10.1109/CSFW.2001.930133

L. Zheng and A. C. Myers, Dynamic security labels and noninterference, Proc. Workshop Formal Aspects in Security and Trust, 2004.