1. Abadi, M., Secrecy by Typing in Cryptographic Protocols (Draft), unpublished manuscript, DEC Systems Research Center, December 1996.
2. Andrews, G. and Reitman, R., An Axiomatic Approach to Information Flow in Programs, ACM Trans. on Programming Languages and Systems, 2, 1, pp. 56–76, 1980.
3. Banâtre, J., Bryce, C., and Le Métayer, D., Compile-time Detection of Information Flow in Sequential Programs, Proc. 3rd ESORICS, LNCS 875, pp. 55–73, 1994.
4. Bell, D. and LaPadula, L., Secure Computer System: Mathematical Foundations and Model, MITRE Corp. Tech Report M74-244, 1973.
5. Denning, D., A Lattice Model of Secure Information Flow, Comm of the ACM, 19, 5, pp. 236–242, 1976.