Denning, D. E. (1976). A lattice model of secure informa-
tion flow. CACM, 19(5):236–243.
Denning, D. E. and Denning, P. J. (1977). Certification
of programs for secure information flow. CACM,
20(7):504–513.
Denning, D. E. R. (1975). Secure information flow in com-
puter systems.
Efstathopoulos, P., Krohn, M., VanDeBogart, S., Frey, C.,
Ziegler, D., Kohler, E., Mazieres, D., Kaashoek, F.,
and Morris, R. (2005). Labels and event processes in
the asbestos operating system. In Proc. of 20th ACM
SOSP, volume 39, pages 17–30.
Goguen, J. A. and Meseguer, J. (1982). Security policies
and security models. In IEEE Symposium on SP, pa-
ges 11–11.
Hammer, C. and Snelting, G. (2009). Flow-sensitive,
context-sensitive, and object-sensitive information
flow control based on program dependence graphs.
Int. Journal of Information Security, 8(6):399–422.
Hedin, D., Birgisson, A., Bello, L., and Sabelfeld, A.
(2014). JSFlow: Tracking information flow in javas-
cript and its APIs. In Proc. of 29th Annual ACM SAC,
pages 1663–1671.
Hicks, B., King, D., and McDaniel, P. (2007). Jifclipse: de-
velopment tools for security-typed languages. In Proc.
of Workshop on PLAS, pages 1–10.
Hritcu, C., Greenberg, M., Karel, B., Pierce, B. C., and
Morrisett, G. (2013). All your IFCException are be-
long to us. In IEEE Symposium on SP, pages 3–17.
Hunt, S. and Sands, D. (2006). On flow-sensitive security
types. In ACM SIGPLAN Notices, volume 41, pages
79–90.
Krohn, M. N., Yip, A., Brodsky, M. Z., Cliffer, N., Kaas-
hoek, M. F., Kohler, E., and Morris, R. (2007). Infor-
mation flow control for standard OS abstractions. In
Proc. of 21st ACM SOSP, pages 321–334.
Le Guernic, G. (2007). Automaton-based confidentiality
monitoring of concurrent programs. In Proc. of 20th
IEEE CSF Symposium, pages 218–232.
Myers, A. C. (1999). JFlow: Practical mostly-static infor-
mation flow control. In Proc. 26th ACM Symposium
on POPL, pages 228–241.
Myers, A. C. and Liskov, B. (2000). Protecting privacy
using the decentralized label model. ACM TOSEM,
9(4):410–442.
Myers, A. C., Zheng, L., Zdancewic, S., Chong, S., and
Nystrom, N. (2001). Jif: Java information flow.
http://www.cs.cornell.edu/jif.
Robling Denning, D. E. (1982). Cryptography and data
security. Addison-Wesley Longman Publishing Co.
Ryan, P., McLean, J., Millen, J., and Gligor, V. (2001). Non-
interference, who needs it? In Proc. of 14th IEEE CSF
Workshop, pages 237–238.
Sabelfeld, A. and Myers, A. C. (2003). Language-based
information-flow security. IEEE Journal on Selected
Areas in Communications, 21(1):5–19.
Simonet, V. and Rocquencourt, I. (2003). Flow caml in a
nutshell. In Proc. of 1st APPSEM-II workshop, pages
152–165.
Stefan, D., Russo, A., Buiras, P., Levy, A., Mitchell, J. C.,
and Mazi
´
eres, D. (2012a). Addressing covert termi-
nation and timing channels in concurrent information
flow systems. In ACM SIGPLAN Notices, volume 47,
pages 201–214.
Stefan, D., Russo, A., Mitchell, J. C., and Mazi
`
eres, D.
(2011). Flexible dynamic information flow control in
haskell. In ACM Sigplan Notices, volume 46, pages
95–106.
Stefan, D., Russo, A., Mitchell, J. C., and Mazi
`
eres, D.
(2012b). Flexible dynamic information flow control
in the presence of exceptions. CoRR, abs/1207.1457.
Volpano, D. M., Irvine, C. E., and Smith, G. (1996). A
sound type system for secure flow analysis. Journal
of Computer Security, 4(2/3):167–188.
Zdancewic, S., Zheng, L., Nystrom, N., and Myers, A. C.
(2002). Secure program partitioning. ACM Transacti-
ons on Computer Systems (TOCS), 20(3):283–328.
Zeldovich, N., Boyd-Wickizer, S., Kohler, E., and
Mazi
`
eres, D. (2006). Making information flow ex-
plicit in HiStar. In Proc. of 7th Symp. on OSDI, pages
263–278.
Zheng, L. and Myers, A. C. (2007). Dynamic security la-
bels and static information flow control. International
Journal of Information Security, 6(2-3):67–84.
Static Security Certification of Programs via Dynamic Labelling
245