R. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke, A core calculus of dependency, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.147-160, 1999.
DOI : 10.1145/292540.292555

[. Abadi, B. Lampson, and J. Lévy, Analysis and caching of dependencies, Proc. ACM International Conf. on Functional Programming, pp.83-91, 1996.

F. B. Bowen-alpern and . Schneider, Defining liveness, Information Processing Letters, vol.21, issue.4, pp.181-185, 1985.
DOI : 10.1016/0020-0190(85)90056-0

[. Ashby, An Introduction to Cybernetics, 1956.

J. Brown, T. F. Knight, and J. , A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information flow, 2001.

[. Banerjee and D. A. Naumann, Using access control for secure information flow in a Java-like language, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.155-169131, 2003.
DOI : 10.1109/CSFW.2003.1212711

S. L. Brand, Department of Defense Trusted Computer System Evaluation Criteria, National Computer Security Center, 1985.

B. [. Barthe and . Serpette, Partial Evaluation and Non-interference for Object Calculi, Proc. FLOPS, pp.53-67, 1999.
DOI : 10.1007/10705424_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

E. S. Cohen, Information Transmission in Computational Systems, ACM SIGOPS Operating Systems Review, vol.11, issue.5, pp.133-139, 1977.

[. Erlingsson and F. B. Schneider, SASI enforcement of security policies, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.87-95, 1999.
DOI : 10.1145/335169.335201

]. J. Fen74 and . Fenton, Memoryless Subsystems, Computing J, vol.17, issue.2, pp.143-147, 1974.

A. Joseph, J. Goguen, [. Meseguer, G. Gandhe, A. Venkatesh et al., Security Policies and Security Models Labeled Lambda-Calculus and a Generalized Notion of Strictness (An Extended Abstract), Proc. IEEE Symp. Security and Privacy Proc. Asian C. S. Conf. on Algorithms, Concurrency and Knowledge, pp.11-20, 1982.

K. W. Hamlen, G. Morrisett, and F. B. Schneider, Certified In-lined Reference Monitoring on .NET, Proceedings of the 2006 workshop on Programming languages and analysis for security , PLAS '06, 2006.
DOI : 10.1145/1134744.1134748

G. Kahn, Natural semantics, Proceedings of the Symposium on Theoretical Aspects of Computer Science, pp.22-39, 1987.
DOI : 10.1007/BFb0039592

URL : https://hal.archives-ouvertes.fr/inria-00075953

[. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005.
DOI : 10.1007/s10207-004-0046-8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Ligatti, L. Bauer, and D. Walker, Enforcing Non-safety Security Policies with Program Monitors, ESORICS, pp.355-373, 2005.
DOI : 10.1007/11555827_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

[. , L. Guernic, and T. Jensen, Monitoring Information Flow, Proceedings of the Workshop on Foundations of Computer Security, pp.19-30, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00001218

B. [. Myers and . Liskov, Complete, safe information flow with decentralized labels, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.186-197, 1998.
DOI : 10.1109/SECPRI.1998.674834

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

[. Masri, A. Podgurski, and D. Leon, Detecting and Debugging Insecure Information Flows, 15th International Symposium on Software Reliability Engineering, pp.198-209, 2004.
DOI : 10.1109/ISSRE.2004.17

D. [. Mizuno and . Schmidt, A security flow control algorithm and its denotational semantics correctness proof, Formal Aspects of Computing, vol.69, issue.2, pp.727-754, 1992.
DOI : 10.1007/BF03180570

[. Mantel and A. Sabelfeld, A generic approach to the security of multi-threaded programs, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.126-142, 2001.
DOI : 10.1109/CSFW.2001.930142

]. A. Mye99a and . Myers, JFlow: Practical Mostly-Static Information Flow Control, Proc. ACM Symp. Principles of Programming Languages, pp.228-241, 1999.

C. Andrew and . Myers, Mostly-Static Decentralized Information Flow Control, 1999.

[. Nsa, Module Eight -Mandatory Access Control and Labels, 1995.

F. Cois, P. , and S. Conchon, Information flow inference for free, Proc. ACM International Conf. on Functional Programming, pp.46-57, 2000.

F. Pottier and V. Simonet, Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003.
DOI : 10.1145/596980.596983

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

[. Simonet, Fine-grained Information Flow Analysis for a ?calculus with Sum Types, Proc. IEEE Computer Security Foundations Workshop, pp.223-237, 2002.

[. Suh, J. W. Lee, D. Zhang, and S. Devadas, Secure program execution via dynamic information flow tracking, Proc. Int. Conf. Architectural Support for Programming Languages and Operating Systems, pp.85-96, 2004.

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

[. Smith, A new type system for secure information flow, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.115-125, 2001.
DOI : 10.1109/CSFW.2001.930141

A. Sabelfeld and D. Sands, A Per Model of Secure Information Flow in Sequential Programs, Higher Order and Symbolic Computation, pp.59-91, 2001.
DOI : 10.1007/3-540-49099-X_4

[. Terauchi and A. Aiken, Secure Information Flow as a Safety Problem, In SAS, pp.352-367, 2005.
DOI : 10.1007/11547662_24

N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni et al., RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), 2004.
DOI : 10.1109/MICRO.2004.31

D. Volpano, G. Smith, and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.
DOI : 10.3233/JCS-1996-42-304

L. Wall, T. Christiansen, and J. Orwant, Programming Perl, 2000.

C. Weissman, Security controls in the ADEPT-50 timesharing system, Proc. AFIPS Fall Joint Computer Conf, pp.119-133, 1969.

P. L. John and . Woodward, Exploiting the Dual Nature of Sensitivity Labels, Proc. IEEE Symp. Security and Privacy, pp.23-31, 1987.

A. [. Zdancewic and . Myers, Robust declassification, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.15-23, 2001.
DOI : 10.1109/CSFW.2001.930133

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=