M. Abadi, A. Banerjee, N. Heintze, and J. And-riecke, A core calculus of dependency, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.147-160, 1999.
DOI : 10.1145/292540.292555

A. Matos and A. , Typing secure information flow: declassification and mobility, 2006.
URL : https://hal.archives-ouvertes.fr/pastel-00001765

T. Amtoft, S. Bandhakavi, and A. Banerjee, A logic for information flow in objectoriented programs, Proceedings of POPL'06, pp.91-102, 2006.

A. Appel and A. Felty, A semantic model of types and machine instuctions for proofcarrying code, Proceedings POPL'00, pp.243-253, 2000.

A. Askarov and A. Sabelfeld, Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study, Proceedings of ESORICS'05, pp.197-221, 2005.
DOI : 10.1007/11555827_12

B. Aydemir, A. Bohannon, M. Fairbairn, J. Foster, B. Pierce et al., Mechanized Metatheory for the Masses: The PoplMark Challenge, Proceedings of TPHOLs'05, pp.50-65, 2005.
DOI : 10.1007/11541868_4

A. Banerjee and D. Naumann, Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005.
DOI : 10.1017/S0956796804005453

G. Barthe, A. Basu, R. , and T. , Security types preserving compilation, Proceedings of VMCAI'04, pp.2-15, 2004.
DOI : 10.1016/j.cl.2005.05.002

G. Barthe, A. Basu, R. , and T. , Security types preserving compilation, Computer Languages, Systems & Structures, vol.33, issue.2, 2007.
DOI : 10.1016/j.cl.2005.05.002

G. Barthe, P. D-'argenio, R. , and T. , Secure Information Flow by Self-Composition, Proceedings of CSFW'04, R. Foccardi, pp.100-114, 2004.

G. Barthe, D. Naumann, R. , and T. , Deriving an information flow checker and certifying compiler for Java, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006.
DOI : 10.1109/SP.2006.13

G. Barthe, D. Pichardie, R. , and T. , A Certified Lightweight Non-interference Java Bytecode Verifier, European Symposium on Programming, ESOP'07, pp.125-140, 2007.
DOI : 10.1007/978-3-540-71316-6_10

URL : https://hal.archives-ouvertes.fr/inria-00106182

G. Barthe and T. Rezk, Non-interference for a JVM-like language, Proceedings of the 2005 ACM SIGPLAN international workshop on Types in languages design and implementation , TLDI '05, pp.103-112, 2005.
DOI : 10.1145/1040294.1040304

G. Barthe, T. Rezk, A. Russo, and A. Sabelfeld, Security of multithreaded programs by compilation, ACM Transactions on Information and System Security, vol.13, issue.3, 2007.
DOI : 10.1145/1805974.1805977

G. Barthe and B. Serpette, Partial Evaluation and Non-interference for Object Calculi, Proceedings of FLOPS'99, pp.53-67, 1999.
DOI : 10.1007/10705424_4

L. Beringer and M. Hofmann, Secure information flow and program logics, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007.
DOI : 10.1109/CSF.2007.30

C. Bernardeschi and N. D. Francesco, Combining Abstract Interpretation and Model Checking for Analysing Security Properties of Java Bytecode, Proceedings of VMCAI'02, pp.1-15, 2002.
DOI : 10.1007/3-540-47813-2_1

F. Besson, T. Jensen, and D. Pichardie, Proof-Carrying Code from Certified Abstract Interpretation and Fixpoint Compression. Theoretical Computer Science, 2006.

P. Bieber, J. Cazin, V. Wiels, G. Zanon, P. Girard et al., Checking Secure Interactions of Smart Card Applets, Journal of Computer Security, vol.10, pp.369-398, 2002.
DOI : 10.1007/10722599_1

E. Bonelli, A. Compagnoni, and R. Medel, Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks, Proceedings of CASSIS'05, pp.37-56, 2005.
DOI : 10.1007/BFb0030629

G. Boudol and I. Castellani, Noninterference for concurrent programs and thread systems, Theoretical Computer Science, vol.281, issue.1-2, pp.109-130, 2002.
DOI : 10.1016/S0304-3975(02)00010-5

URL : https://hal.archives-ouvertes.fr/inria-00072334

A. Darvas, R. Hähnle, and D. Sands, A Theorem Proving Approach to Analysis of Secure Information Flow, Proceedings International Conference on Security in Pervasive Computing Preliminary version in the informal proceedings of WITS'03, pp.193-209, 2005.
DOI : 10.1007/978-3-540-32004-3_20

G. Dufay, A. Felty, and S. Matwin, Privacy-Sensitive Information Flow with JML, Proceedings of CADE'05, pp.116-130, 2005.
DOI : 10.1007/11532231_9

S. N. Freund and J. C. Mitchell, A Type System for the Java Bytecode Language and Verifier, Journal of Automated Reasoning, vol.30, pp.3-4, 2003.

S. Genaim and F. Spoto, Information Flow Analysis for Java Bytecode, Proceedings of VMCAI'05, R. Cousot, pp.346-362, 2005.
DOI : 10.1007/978-3-540-30579-8_23

P. Girard, Which security policy for multiapplication smart cards, Proceedings of Smartcard'99. USENIX Association, 1999.

C. Hammer, J. Krinke, and G. Snelting, Information flow control for java based on path conditions in dependence graphs, Proceedings of ISSSE'06, pp.87-96, 2006.

D. Hedin and D. Sands, Noninterference in the Presence of Non-Opaque Pointers, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.255-269, 2006.
DOI : 10.1109/CSFW.2006.19

N. Heintze and J. Riecke, The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.365-377, 1998.
DOI : 10.1145/268946.268976

K. Honda and N. Yoshida, A Uniform Type Structure for Secure Information Flow, Proceedings of POPL'02, pp.81-92, 2002.

N. Kobayashi and K. Shirane, Type-Based Information Analysis for Low-Level Languages, Proceedings of APLAS'02, pp.302-316, 2002.

X. Leroy, Bytecode verification on Java smart cards. Software?practice and experience 32, pp.319-340, 2002.
URL : https://hal.archives-ouvertes.fr/hal-01499944

H. Mantel and A. Sabelfeld, A unifying approach to the security of distributed and multi-threaded programs1, Journal of Computer Security, vol.11, issue.4, pp.615-676, 2003.
DOI : 10.3233/JCS-2003-11406

C. Marché, C. Paulin-mohring, U. , and X. , The KRAKATOA tool for certificationof JAVA/JAVACARD programs annotated in JML, The Journal of Logic and Algebraic Programming, vol.58, issue.1-2, pp.89-106, 2004.
DOI : 10.1016/j.jlap.2003.07.006

R. Medel, A. Compagnoni, and E. Bonelli, A Typed Assembly Language for Non-interference, Proceedings of ICTCS 2005, pp.360-374, 2005.
DOI : 10.1007/11560586_29

M. Montgomery and K. Krishna, Secure Object Sharing in Java Card, Proceedings of Usenix workshop on Smart Card Technology, 1999.

G. Morrisett, D. Walker, K. Crary, and N. Glew, From system F to typed assembly language, ACM Transactions on Programming Languages and Systems, vol.21, issue.3, pp.527-568, 1999.
DOI : 10.1145/319301.319345

A. Myers, JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999.
DOI : 10.1145/292540.292561

D. Naumann, Verifying a Secure Information Flow Analyzer, Proceedings of TPHOLs'05, pp.211-226, 2003.
DOI : 10.1007/11541868_14

D. Naumann, From coupling relations to mated invariants for checking information flow (extended abstract), Proceedings of ESORICS'06, 2006.

F. Nielson, H. R. Nielson, and C. Hankin, Principles of Program Analysis, 1999.
DOI : 10.1007/978-3-662-03811-6

O. Neill, K. R. Clarkson, M. R. , C. , and S. , Information-flow security for interactive programs, Proceedings of CSFW'06, pp.190-201, 2006.

F. Pottier and V. Simonet, Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003.
DOI : 10.1145/596980.596983

T. Rezk, Verification of confidentiality policies for mobile code, 2006.

A. Russo and A. Sabelfeld, Securing Interaction between Threads and the Scheduler, 19th IEEE Computer Security Foundations Workshop (CSFW'06), 2006.
DOI : 10.1109/CSFW.2006.29

A. Sabelfeld and A. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

A. Sabelfeld and D. Sands, Dimensions and principles of declassification, Proceedings of CSFW'05, 2005.

G. Smith and D. Volpano, Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.355-364, 1998.
DOI : 10.1145/268946.268975

Q. Sun, A. Banerjee, and D. Naumann, Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language, Proceedings of SAS'04, pp.84-99, 2004.
DOI : 10.1007/978-3-540-27864-1_9

T. Terauchi and A. Aiken, Secure Information Flow as a Safety Problem, Proceedings of SAS'05, pp.352-367, 2005.
DOI : 10.1007/11547662_24

D. Volpano and G. Smith, A type-based approach to program security, Proceedings of TAPSOFT'97, pp.607-621, 1997.
DOI : 10.1007/BFb0030629

D. Yu and N. Islam, A Typed Assembly Language for Confidentiality, Proceedings of ESOP'06, P. Sestoft, pp.162-179, 2006.
DOI : 10.1023/A:1020843229247

S. Zdancewic and A. Myers, Secure information flow via linear continuations, Higher- Order and Symbolic Computation, pp.2-3, 2002.