References
- D.E. Denning, A lattice model of secure information flow, 19(5): 236-243, 1976 https://doi.org/10.1145/360051.360056
- D.E. Denning and P.J. Denning, Certification of programs for secure information flow, Communication of the ACM, 20(7):504-512, 1977 https://doi.org/10.1145/359636.359712
- G.R. Andrews and R.P. Reitman, An axiomatic approach to information flow in programs, ACM Transactions on Programming Languages and Systems, 21(1):56-76, 1980 https://doi.org/10.1145/357084.357088
- M. Mizuno and D.A. Schmidt, A security flow control algorithm and its denotational semantics correctness proof, Formal Aspects of Computing, 4:722-754, 1992
- J.-P. Banatre, C. Bryce, and D. Metayer, Compile-time detection of information flow in sequential programs, In D. Gollmann, editor, Computer Security - ESORICS'94, the 3rd European Symposium on Research in Computer Security, Lecture Notes in Computer Science, volume 875, pages 55-73, Springer-Verlag, 1997 https://doi.org/10.1007/3-540-58618-0_56
- D. Volpano, G. Smith, A type-based approach to program security, In TAPSOFT'97, the 7th International Conference on Theory and Practice of Software Development, Lecture Notes in Computer Science, pages 607-621, Springer-Verlag, 1997 https://doi.org/10.1007/BFb0030629
- D. Volpano, G. Smith and C. Irvine, A sound type system for secure information flow, Journal of Computer Security, 4:1-21, 2001
- R. Joshi and K.R.M. Leino, A semantic approach to secure information flow, Science of Computer Programming, 37:113-138, 2000 https://doi.org/10.1016/S0167-6423(99)00024-6
- A. Sabelfeld and D. Sands, A PER model of secure information flow in sequential programs, Higher-Order and Symbolic Computations, 14:59-91, 2001 https://doi.org/10.1023/A:1011553200337
- F. Nielson, H.R. Nielson and C. Hankin, Principles of Program Analysis, Springer, 1999
- A. Sabelfeld and A.C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, To apper, 2002 https://doi.org/10.1109/JSAC.2002.806121
- J.A. Goguen and J. Meseguer, Unwinding and inference control, In Proc. IEEE Symposium on Security and Privacy, pages 75-86, 1984