@article(AlmeidaMatos2009, author = {Almeida~Matos, Ana and G{\'e}rard Boudol}, year = {2009}, title = {On Declassification and the Non-disclosure Policy}, journal = {J. Comput. Secur.}, volume = {17}, number = {5}, pages = {549--597}, doi = {10.3233/JCS-2009-0355}, ) @book(Alur2003, author = {Deepak Alur and Dan Malks and John Crupi and Grady Booch and Martin Fowler}, year = {2003}, title = {Core J2EE Patterns (Core Design Series): Best Practices and Design Strategies}, edition = {2}, publisher = {Sun Microsystems, Inc.}, address = {Mountain View, CA, USA}, ) @article(Andrews1980, author = {Gregory~R. Andrews and Richard~P. Reitman}, year = {1980}, title = {An Axiomatic Approach to Information Flow in Programs}, journal = {ACM Trans. Program. Lang. Syst.}, volume = {2}, number = {1}, pages = {56--76}, doi = {10.1145/357084.357088}, ) @article(Appel1998, author = {Andrew~W. Appel}, year = {1998}, title = {SSA is Functional Programming}, journal = {SIGPLAN Not.}, volume = {33}, number = {4}, pages = {17--20}, doi = {10.1145/278283.278285}, ) @inproceedings(Austin2009, author = {Thomas~H. Austin and Cormac Flanagan}, year = {2009}, title = {Efficient Purely-dynamic Information Flow Analysis}, booktitle = {Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security}, series = {PLAS '09}, publisher = {ACM}, address = {New York, NY, USA}, pages = {113--124}, doi = {10.1145/1554339.1554353}, ) @inproceedings(Austin2010, author = {Thomas~H. Austin and Cormac Flanagan}, year = {2010}, title = {Permissive Dynamic Information Flow Analysis}, booktitle = {Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security}, pages = {3:1--3:12}, doi = {10.1145/1814217.1814220}, ) @inproceedings(Caires2011, author = {Lu\'{\i}s Caires and Jorge~A. P{\'e}rez and Jo\~{a}o~Costa Seco and Hugo~Torres Vieira and Ferr\~{a}o, L\'{u}cio}, year = {2011}, title = {Type-based Access Control in Data-centric Systems}, booktitle = {Proceedings of the 20th European Conference on Programming Languages and Systems: Part of the Joint European Conferences on Theory and Practice of Software}, series = {ESOP'11/ETAPS'11}, publisher = {Springer-Verlag}, address = {Berlin, Heidelberg}, pages = {136--155}, doi = {10.1006/inco.1994.1093}, ) @inproceedings(Chandra2007, author = {D.~Chandra and M.~Franz}, year = {2007}, title = {Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine}, booktitle = {Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)}, pages = {463--475}, doi = {10.1109/ACSAC.2007.37}, ) @book(Daigneau2011, author = {Robert Daigneau}, year = {2011}, title = {Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services}, edition = {1}, publisher = {Addison-Wesley Professional}, ) @article(Denning1976, author = {Dorothy~E. Denning}, year = {1976}, title = {A Lattice Model of Secure Information Flow}, journal = {Commun. ACM}, volume = {19}, number = {5}, pages = {236--243}, doi = {10.1145/360051.360056}, ) @article(Denning1977, author = {Dorothy~E. Denning and Peter~J. Denning}, year = {1977}, title = {Certification of Programs for Secure Information Flow}, journal = {Commun. ACM}, volume = {20}, number = {7}, pages = {504--513}, doi = {10.1145/359636.359712}, ) @article(Enck2014, author = {William Enck and Peter Gilbert and Byung-Gon Chun and Landon~P. Cox and Jaeyeon Jung and Patrick McDaniel and Anmol~N. Sheth}, year = {2014}, title = {{TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones}}, journal = {Communications of the ACM}, doi = {10.1145/2494522}, ) @inproceedings(Erlingsson:1999:SES:335169.335201, author = {\'{U}lfar Erlingsson and Fred~B. Schneider}, year = {2000}, title = {SASI Enforcement of Security Policies: A Retrospective}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms}, series = {NSPW '99}, publisher = {ACM}, address = {New York, NY, USA}, pages = {87--95}, doi = {10.1145/335169.335201}, url = {http://doi.acm.org/10.1145/335169.335201}, ) @misc(Ferreira2012, author = {Paulo Jorge Abreu~Duarte Ferreira}, year = {2012}, title = {MSc Dissertation. Information flow analysis using data-dependent logical propositions.}, note = {Faculdade de Ci\IeC{\^e}ncias e Tecnologia, Universidade Nova de Lisboa}, ) @inproceedings(tooljoana2013atps, author = {J{\"u}rgen Graf and Martin Hecker and Martin Mohr}, year = {2013}, title = {Using JOANA for Information Flow Control in Java Programs - A Practical Guide}, booktitle = {Proceedings of the 6th Working Conference on Programming Languages (ATPS'13)}, ) @article(Lourenco2015, author = {Louren\c{c}o, Lu\'{\i}sa and Lu\'{\i}s Caires}, year = {2015}, title = {Dependent Information Flow Types}, journal = {SIGPLAN Not.}, volume = {50}, number = {1}, pages = {317--328}, doi = {10.1145/2775051.2676994}, ) @phdthesis(Lourenco2016, author = {Louren\IeC{\c c}o, Maria Lu\IeC{\'\i}sa Sobreira~Gouveia}, year = {2016}, title = {A type system for value-dependent information flow analysis}, ) @inproceedings(Myers2003, author = {Andrew~C. Myers and Barbara Liskov}, year = {2003}, title = {{Protecting privacy using the decentralized label model}}, booktitle = {Foundations of Intrusion Tolerant Systems, OASIS 2003}, pages = {89--116}, doi = {10.1145/363516.363526}, ) @(JIF, author = {Andrew~C. Myers and Lantian Zheng and Steve Zdancewic and Stephen Chong and Nathaniel Nystrom}, year = {2006}, title = {Jif 3.0: Java information flow}, url = {http://www.cs.cornell.edu/jif}, ) @article(Sabelfeld2003, author = {Andrei Sabelfeld and Andrew~C. Myers}, year = {2003}, title = {{Language-based information-flow security}}, journal = {IEEE Journal on Selected Areas in Communications}, volume = {21}, number = {1}, pages = {5--19}, doi = {10.1109/JSAC.2002.806121}, ) @misc(LBS2001, author = {Fred Schneider and Greg Morrisett and Robert Harper}, year = {2001}, title = {{A Language-Based Approach to Security}}, ) @(FlowCaml, author = {V.~Simonet}, year = {2003}, title = {The Flow Caml System (version 1.00): Documentation and user's manual}, url = {http://www.normalesup.org/~simonet/soft/flowcaml/manual/}, ) @article(Vallee-Rai1999, author = {R~Vall{\'{e}}e-Rai and P~Co and E~Gagnon}, year = {1999}, title = {{Soot-a Java bytecode optimization framework}}, journal = {CASCON}, ) @phdthesis(ZdancewicPHD, author = {Stephan~Arthur Zdancewic}, year = {2002}, title = {Programming Languages for Information Security}, address = {Ithaca, NY, USA}, note = {AAI3063751}, ) @article(Zdancewic2004, author = {Steve Zdancewic}, year = {2004}, title = {{Challenges for information-flow security}}, journal = {Proceedings of the 1st International Workshop on the Programming Language Interference and Dependence (PLID'04)}, ) @article(Zhao2013, author = {Jianzhou Zhao and Santosh Nagarakatte and Milo~M.K. Martin and Steve Zdancewic}, year = {2013}, title = {Formal Verification of SSA-based Optimizations for LLVM}, journal = {SIGPLAN Not.}, volume = {48}, number = {6}, pages = {175--186}, doi = {10.1145/2499370.2462164}, )