1. Lecture Notes in Computer Science;O. Agesen,1995
2. Aho, A.V., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading (1986)
3. Ashcraft, K., Engler, D.: Using Programmer-Written Compiler Extensions to Catch Security Holes. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA, USA, may 2002, pp. 143–159. IEEE Computer Society Press, Los Alamitos (2002)
4. Banerjee, A., Naumann, D.A.: A Simple Semantics and Static Analysis for Java Security. Technical Report CS2001-1, Stevens Institute of Technology, Hoboken, NJ, USA (July 2001)
5. Electronic Notes in Theoretical Computer Science;M. Bartoletti,2001