A core calculus of dependency, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.147-160, 1999. ,
DOI : 10.1145/292540.292555
Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005. ,
DOI : 10.1017/S0956796804005453
Partial evaluation and noninterference for object calculi, Proc. Functional and Logic Programming, pp.53-67, 1999. ,
A semantics for concurrent separation logic, Proc. Concurrency Theory, pp.16-34, 2004. ,
A minimal trusted computing base for dynamically ensuring secure information flow, 2001. ,
Information transmission in computational systems, Operating Systems Review, vol.11, issue.5, pp.133-139, 1977. ,
Memoryless subsystems, The Computer Journal, vol.17, issue.2, pp.143-147, 1974. ,
DOI : 10.1093/comjnl/17.2.143
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
Towards a theory of parallel programming Automaton-based Non-interference Monitoring of Concurrent Programs, Operating Systems Techniques, pp.61-71, 1972. ,
Automaton-based confidentiality monitoring, Proc. Asian Computing Science, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00161019
Monitoring Information Flow, Proc. Workshop on Foundations of Computer Security, pp.19-30, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00001218
Detecting and Debugging Insecure Information Flows, 15th International Symposium on Software Reliability Engineering, pp.198-209, 2004. ,
DOI : 10.1109/ISSRE.2004.17
A security flow control algorithm and its denotational semantics correctness proof, Formal Aspects of Computing, vol.69, issue.2, pp.727-754, 1992. ,
DOI : 10.1007/BF03180570
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999. ,
DOI : 10.1145/292540.292561
Resources, Concurrency and Local Reasoning, Proc. Concurrency Theory, pp.49-67, 2004. ,
Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003. ,
DOI : 10.1145/596980.596983
Closing Internal Timing Channels by Transformation, Proc. Asian Computing Science, 2006. ,
DOI : 10.3233/JCS-1996-42-304
The Impact of Synchronisation on Secure Information Flow in Concurrent Programs, Proc. Perspectives of System Informatics, pp.227-241, 2001. ,
DOI : 10.1007/3-540-45575-2_22
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
A Per Model of Secure Information Flow in Sequential Programs, Higher Order and Symbolic Computation, pp.59-91, 2001. ,
DOI : 10.1007/3-540-49099-X_4
Dynamic Dependency Monitoring to Secure Information Flow, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007. ,
DOI : 10.1109/CSF.2007.20
Secure information flow in a multi-threaded imperative language, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.355-364, 1998. ,
DOI : 10.1145/268946.268975
RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), 2004. ,
DOI : 10.1109/MICRO.2004.31
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304
Security controls in the adept-50 timesharing system, Proc. AFIPS Fall Joint Computer Conf, pp.119-133, 1969. ,
Exploiting the Dual Nature of Sensitivity Labels, 1987 IEEE Symposium on Security and Privacy, pp.23-31, 1987. ,
DOI : 10.1109/SP.1987.10016