W. R. Ashby, An Introduction to Cybernetics, 1956.

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

E. S. Cohen, Information transmission in computational systems, ACM SIGOPS Operating Systems Review, vol.11, issue.5, pp.133-139, 1977.

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni et al., RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), 2004.
DOI : 10.1109/MICRO.2004.31

L. Guernic, G. Banerjee, A. Jensen, T. Schmidt, and D. , Automata-Based Confidentiality Monitoring, Proc. Asian Computing Science Conference, 2006.
DOI : 10.1007/11555827_21

URL : https://hal.archives-ouvertes.fr/inria-00130210

P. Shroff, S. F. Smith, and M. Thober, Dynamic Dependency Monitoring to Secure Information Flow, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007.
DOI : 10.1109/CSF.2007.20

L. Guernic, G. Jensen, and T. , Monitoring Information Flow, Proc. Workshop on Foundations of Computer Security, pp.19-30, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00001218

S. C. Ntafos, A comparison of some structural testing strategies, IEEE Transactions on Software Engineering, vol.14, issue.6, pp.868-874, 1988.
DOI : 10.1109/32.6165

B. Beizer, Software Testing Techniques, 1990.

N. Williams, B. Marre, P. Mouy, and R. Muriel, PathCrawler: Automatic Generation of Path Tests by Combining Static and Dynamic Analysis, Proc. European Dependable Computing Conference, pp.281-292, 2005.
DOI : 10.1007/11408901_21

P. Godefroid, N. Klarlund, and K. Sen, DART, Proc. Programming Language Design and Implementation, pp.213-223, 2005.
DOI : 10.1145/1064978.1065036

K. Sen and G. Agha, CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools, Proc. Computer Aided Verification, pp.419-423, 2006.
DOI : 10.1007/11817963_38

N. Gupta, A. P. Mathur, and M. L. Soffa, Automated Test Data Generation Using an Iterative Relaxation Method, Proc. Symposium on Foundations of Software Engineering, pp.231-244, 1998.

A. C. Myers, JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999.
DOI : 10.1145/292540.292561

F. Pottier and V. Simonet, Information flow inference for ML, ACM Transactions on Programming Languages and Systems, vol.25, issue.1, pp.117-158, 2003.
DOI : 10.1145/596980.596983

L. Guernic and G. , Automaton-based Confidentiality Monitoring of Concurrent Programs, 20th IEEE Computer Security Foundations Symposium (CSF'07), 2007.
DOI : 10.1109/CSF.2007.10

URL : https://hal.archives-ouvertes.fr/inria-00161019