1. Shroff, P., Smith, S., Thober, M.: Securing information Flow via Dynamic Capture of Dependencies. Journal of Computer Security 16, 673–688 (2008)
2. Myers, A.C., Liskov, B.: Protecting Privacy Using the Decentralized Label Model. ACM TOSEM 9, 410–442 (2000)
3. Hassan, D., Mousavi, M., Reniers, M.: Restricted Delegation and Revocation in Language-Based Security (Position Paper). In: Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS 2010, Toronto, Canada. ACM Press (June 2010)
4. Hassan, D., Mousavi, M.: RDR: A Language for Restricted Delegation and Revocation. Technical report, Department of Computer Science, Eindhoven University of Technology (2011),
http://www.win.tue.nl/~mousavi/rdr-tech-rep.pdf
5. van den Brand, M.G.J., Klint, P.: Asf+sdf Meta-Environment User Manual - Revision 1.134. Technical report, CWI Centrum voor Wiskunde en Informatica, Amsterdam (2003),
www.cwi.nl/projects/MetaEnv/meta