1. Lecture Notes in Computer Science;M. Barnett,2006
2. Lecture Notes in Computer Science;M. Barnett,2005
3. Barthe, G., D’Argenio, P.R., Rezk, T.: Secure information flow by self-composition. In: Computer Security Foundations (CSFW), pp. 100–114. IEEE Computer Society Press, Los Alamitos (2004)
4. Burstall, R.M.: Some techniques for proving correctness of programs which alter data structures. Machine Intelligence 7, 23–50 (1972)
5. Lecture Notes in Computer Science;S. Chatterjee,2007