Dynamic Taint Propagation for Java, 21st Annual Computer Security Applications Conference (ACSAC'05), 2005. ,
DOI : 10.1109/CSAC.2005.21
Secure program execution via dynamic information flow tracking, ACM SIGARCH Computer Architecture News, vol.32, issue.5, pp.85-96, 2004. ,
DOI : 10.1145/1037947.1024404
A decentralized model for information flow control, Proc. ACM Symp. on Operating System Principles, pp.129-142, 1997. ,
Complete, safe information flow with decentralized labels, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), 1998. ,
DOI : 10.1109/SECPRI.1998.674834
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999. ,
DOI : 10.1145/292540.292561
Policy-based intrusion detection in web applications by monitoring java information flows, Int. J. Inf. Comput. Secur, vol.3, issue.34, pp.265-279, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00448139
Specifying and enforcing a fine-grained information flow policy: Model and experiments, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00516672
Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977. ,
DOI : 10.1145/359636.359712
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, 2003. ,
DOI : 10.1109/JSAC.2002.806121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979