V. Haldar, D. Chandra, and M. Franz, Dynamic Taint Propagation for Java, 21st Annual Computer Security Applications Conference (ACSAC'05), 2005.
DOI : 10.1109/CSAC.2005.21

G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas, Secure program execution via dynamic information flow tracking, ACM SIGARCH Computer Architecture News, vol.32, issue.5, pp.85-96, 2004.
DOI : 10.1145/1037947.1024404

A. C. Myers and B. Liskov, A decentralized model for information flow control, Proc. ACM Symp. on Operating System Principles, pp.129-142, 1997.

A. Myers and B. Liskov, Complete, safe information flow with decentralized labels, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), 1998.
DOI : 10.1109/SECPRI.1998.674834

A. C. Myers, JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999.
DOI : 10.1145/292540.292561

G. Hiet, V. Viet-triem-tong, L. Me, and B. Morin, Policy-based intrusion detection in web applications by monitoring java information flows, Int. J. Inf. Comput. Secur, vol.3, issue.34, pp.265-279, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00448139

V. Viet-triem, A. Tong, L. Clark, and . Mé, Specifying and enforcing a fine-grained information flow policy: Model and experiments, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00516672

D. E. Denning and P. J. Denning, Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977.
DOI : 10.1145/359636.359712

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, 2003.
DOI : 10.1109/JSAC.2002.806121

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=