A core calculus of dependency, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.147-160, 1999. ,
DOI : 10.1145/292540.292555
Analysis and caching of dependencies, Proc. ACM International Conf. on Functional Programming, pp.83-91, 1996. ,
Defining liveness, Information Processing Letters, vol.21, issue.4, pp.181-185, 1985. ,
DOI : 10.1016/0020-0190(85)90056-0
An Introduction to Cybernetics, 1956. ,
A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information flow, 2001. ,
Using access control for secure information flow in a Java-like language, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.155-169131, 2003. ,
DOI : 10.1109/CSFW.2003.1212711
Department of Defense Trusted Computer System Evaluation Criteria, National Computer Security Center, 1985. ,
Partial Evaluation and Non-interference for Object Calculi, Proc. FLOPS, pp.53-67, 1999. ,
DOI : 10.1007/10705424_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.4100
Information Transmission in Computational Systems, ACM SIGOPS Operating Systems Review, vol.11, issue.5, pp.133-139, 1977. ,
SASI enforcement of security policies, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.87-95, 1999. ,
DOI : 10.1145/335169.335201
Memoryless Subsystems, Computing J, vol.17, issue.2, pp.143-147, 1974. ,
Security Policies and Security Models Labeled Lambda-Calculus and a Generalized Notion of Strictness (An Extended Abstract), Proc. IEEE Symp. Security and Privacy Proc. Asian C. S. Conf. on Algorithms, Concurrency and Knowledge, pp.11-20, 1982. ,
Certified In-lined Reference Monitoring on .NET, Proceedings of the 2006 workshop on Programming languages and analysis for security , PLAS '06, 2006. ,
DOI : 10.1145/1134744.1134748
Natural semantics, Proceedings of the Symposium on Theoretical Aspects of Computer Science, pp.22-39, 1987. ,
DOI : 10.1007/BFb0039592
URL : https://hal.archives-ouvertes.fr/inria-00075953
Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005. ,
DOI : 10.1007/s10207-004-0046-8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.6074
Enforcing Non-safety Security Policies with Program Monitors, ESORICS, pp.355-373, 2005. ,
DOI : 10.1007/11555827_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.7862
Monitoring Information Flow, Proceedings of the Workshop on Foundations of Computer Security, pp.19-30, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00001218
Complete, safe information flow with decentralized labels, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.186-197, 1998. ,
DOI : 10.1109/SECPRI.1998.674834
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.9924
Detecting and Debugging Insecure Information Flows, 15th International Symposium on Software Reliability Engineering, pp.198-209, 2004. ,
DOI : 10.1109/ISSRE.2004.17
A security flow control algorithm and its denotational semantics correctness proof, Formal Aspects of Computing, vol.69, issue.2, pp.727-754, 1992. ,
DOI : 10.1007/BF03180570
A generic approach to the security of multi-threaded programs, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.126-142, 2001. ,
DOI : 10.1109/CSFW.2001.930142
JFlow: Practical Mostly-Static Information Flow Control, Proc. ACM Symp. Principles of Programming Languages, pp.228-241, 1999. ,
Mostly-Static Decentralized Information Flow Control, 1999. ,
Module Eight -Mandatory Access Control and Labels, 1995. ,
Information flow inference for free, Proc. ACM International Conf. on Functional Programming, pp.46-57, 2000. ,
Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003. ,
DOI : 10.1145/596980.596983
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.6266
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853
Fine-grained Information Flow Analysis for a ?calculus with Sum Types, Proc. IEEE Computer Security Foundations Workshop, pp.223-237, 2002. ,
Secure program execution via dynamic information flow tracking, Proc. Int. Conf. Architectural Support for Programming Languages and Operating Systems, pp.85-96, 2004. ,
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
A new type system for secure information flow, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.115-125, 2001. ,
DOI : 10.1109/CSFW.2001.930141
A Per Model of Secure Information Flow in Sequential Programs, Higher Order and Symbolic Computation, pp.59-91, 2001. ,
DOI : 10.1007/3-540-49099-X_4
Secure Information Flow as a Safety Problem, In SAS, pp.352-367, 2005. ,
DOI : 10.1007/11547662_24
RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), 2004. ,
DOI : 10.1109/MICRO.2004.31
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304
Programming Perl, 2000. ,
Security controls in the ADEPT-50 timesharing system, Proc. AFIPS Fall Joint Computer Conf, pp.119-133, 1969. ,
Exploiting the Dual Nature of Sensitivity Labels, Proc. IEEE Symp. Security and Privacy, pp.23-31, 1987. ,
Robust declassification, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.15-23, 2001. ,
DOI : 10.1109/CSFW.2001.930133
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1928