1. Andrews, G.R., Reitman, R.P.: An axiomatic approach to information flow in programs. ACM Transactions on Programming Languages and Systems (TOPLAS) 2(1), 56–75 (1980)
2. Banerjee, A., Naumann, D.A.: Using access control for secure information flow in a java-like language. In: Proc. IEEE Computer Security Foundations Workshop (2003)
3. Barthe, G., D’Argenio, P., Rezk, T.: Secure information flow by self-composition. In: Proc. IEEE Computer Security Foundations Workshop (2004)
4. Barthe, G., Rezk, T., Naumann, D.: Deriving an information flow checker and certifying compiler for java. In: IEEE Symposium on Security and Privacy (2006)
5. Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Technical Report MTR-2547, vol. 1, MITRE Corp. (1973)