1. Banerjee, A., Naumann, D.A.: Using Access Control for Secure Information Flow in a Java-like Language. In: IEEE Computer Security Foundations Workshop, pp. 155–169. IEEE Computer Society Press, Los Alamitos (2003)
2. Barthe, G., D’Argenio, P.R., Rezk, T.: Secure Information Flow by Self-Composition. In: IEEE Computer Security Foundations Workshop, pp. 100–114. IEEE Computer Society Press, Los Alamitos (2004)
3. Barthe, G., Rezk, T.: Non-Interference for a JVM-like Language. In: ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, pp. 103–112. ACM Press, New York (2005)
4. Bossi, A., Focardi, R., Piazza, C., Rossi, S.: Unwinding in Information Flow Security. In: ENTCS 99, pp. 127–154 (2004)
5. Bossi, A., Macedonio, D., Piazza, C., Rossi, S.: Secure Contexts for Confidential Data. In: IEEE Computer Security Foundations Workshop, pp. 14–25. IEEE Computer Society Press, Los Alamitos (2003)