K. Biba, Integrity considerations for secure computer systems, 1977.

Y. Chen and Y. Kao, Information Flow Query and Verification for Security Policy of Security-Enhanced Linux, Proceedings of IWSEC, pp.389-404, 2006.
DOI : 10.1007/11908739_28

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

T. Harada, T. Horie, and K. Tanaka, Access policy generation system based on process execution history, Network Security Forum, 2003.

G. Hiet, V. Viet-triem, L. Tong, B. Me, and . Morin, Policy-based intrusion detection in web applications by monitoring java information flows, Int. J. Inf. Comput. Secur, vol.3, issue.34, pp.265-279, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00353000

A. L. Herzog-joshua, D. Guttman, and J. D. , Information flow in operating systems : Eager formal methods, Workshop on Issues on the Theory of Security, 2003.

M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek et al., Information flow control for standard os abstractions, Proceedings of the 21st Symposium on Operating Systems Principles, 2007.

J. Leonard, D. E. Lapadula, and . Bell, Secure computer systems: A mathematical model. MTR-2547 (ESD-TR-73-278-II), MITRE Corp, vol.2, 1973.

C. Schaufler, the simplified mandatory access control kernel

C. Vance and S. Smalley, Implementing selinux as a linux security module, 2002.

V. Viet, T. Tong, A. Clark, and L. Mé, Specifying and enforcing a fine-grained information flow policy: Model and experiments, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00516672

R. Watson, B. Feldman, A. Migus, and C. Vance, The TrustedBSD MAC Framework, Proceedings DARPA Information Survivability Conference and Exposition, p.13, 2003.
DOI : 10.1109/DISCEX.2003.1194900

C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-hartman, Linux security modules: general security support for the linux kernel, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp.17-31, 2002.
DOI : 10.1109/FITS.2003.1264934

N. Zeldovich, S. Boyd-wickizer, E. Kohler, and D. Mazì-eres, Making information flow explicit in HiStar, OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation, pp.263-278, 2006.
DOI : 10.1145/2018396.2018419

N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis, Hardware enforcement of application security policies using tagged memory

J. Zimmermann, L. Mé, and C. Bidan, Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level
DOI : 10.1007/3-540-36084-0_16