M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke, A core calculus of dependency, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.147-160, 1999.
DOI : 10.1145/292540.292555

A. Banerjee and D. A. Naumann, Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005.
DOI : 10.1017/S0956796804005453

G. Barthe and B. Serpette, Partial evaluation and noninterference for object calculi, Proc. Functional and Logic Programming, pp.53-67, 1999.

S. D. Brookes, A semantics for concurrent separation logic, Proc. Concurrency Theory, pp.16-34, 2004.

J. Brown, T. F. Knight, and J. , A minimal trusted computing base for dynamically ensuring secure information flow, 2001.

E. S. Cohen, Information transmission in computational systems, Operating Systems Review, vol.11, issue.5, pp.133-139, 1977.

J. S. Fenton, Memoryless subsystems, The Computer Journal, vol.17, issue.2, pp.143-147, 1974.
DOI : 10.1093/comjnl/17.2.143

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

C. A. Hoare and ]. Guernic, Towards a theory of parallel programming Automaton-based Non-interference Monitoring of Concurrent Programs, Operating Systems Techniques, pp.61-71, 1972.

G. , L. Guernic, A. Banerjee, T. Jensen, and D. Schmidt, Automaton-based confidentiality monitoring, Proc. Asian Computing Science, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00161019

G. , L. Guernic, and T. Jensen, Monitoring Information Flow, Proc. Workshop on Foundations of Computer Security, pp.19-30, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00001218

W. Masri, A. Podgurski, and D. Leon, Detecting and Debugging Insecure Information Flows, 15th International Symposium on Software Reliability Engineering, pp.198-209, 2004.
DOI : 10.1109/ISSRE.2004.17

M. Mizuno and D. Schmidt, A security flow control algorithm and its denotational semantics correctness proof, Formal Aspects of Computing, vol.69, issue.2, pp.727-754, 1992.
DOI : 10.1007/BF03180570

A. C. Myers, JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999.
DOI : 10.1145/292540.292561

P. W. O-'hearn, Resources, Concurrency and Local Reasoning, Proc. Concurrency Theory, pp.49-67, 2004.

F. Pottier and V. Simonet, Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003.
DOI : 10.1145/596980.596983

A. Russo, J. Hughes, D. Naumann, and A. Sabelfeld, Closing Internal Timing Channels by Transformation, Proc. Asian Computing Science, 2006.
DOI : 10.3233/JCS-1996-42-304

A. Sabelfeld, The Impact of Synchronisation on Secure Information Flow in Concurrent Programs, Proc. Perspectives of System Informatics, pp.227-241, 2001.
DOI : 10.1007/3-540-45575-2_22

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

A. Sabelfeld and D. Sands, A Per Model of Secure Information Flow in Sequential Programs, Higher Order and Symbolic Computation, pp.59-91, 2001.
DOI : 10.1007/3-540-49099-X_4

P. Shroff, S. F. Smith, and M. Thober, Dynamic Dependency Monitoring to Secure Information Flow, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007.
DOI : 10.1109/CSF.2007.20

G. Smith and D. Volpano, Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.355-364, 1998.
DOI : 10.1145/268946.268975

N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni et al., RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), 2004.
DOI : 10.1109/MICRO.2004.31

D. Volpano, G. Smith, and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.
DOI : 10.3233/JCS-1996-42-304

C. Weissman, Security controls in the adept-50 timesharing system, Proc. AFIPS Fall Joint Computer Conf, pp.119-133, 1969.

J. P. Woodward, Exploiting the Dual Nature of Sensitivity Labels, 1987 IEEE Symposium on Security and Privacy, pp.23-31, 1987.
DOI : 10.1109/SP.1987.10016