1. Newsome J. and Song D. (2005) Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software. In: Proceedings Symposium on Network and Distributed System Security. Available from http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/taintcheck.pdf.
2. JFlow
3. Millen J. (1987) Covert channel capacity. In: Proceedings IEEE Symposium on Security and Privacy 60–66.
4. McCullough D. (1987) Specifications for multi-level security and a hook-up property. In: Proceedings IEEE Symposium on Security and Privacy 161–166.
5. Roy I. , Setty S. T. V. , Kilzer A. , Shmatikov V. and Witchel E. (2010) Airavat: Security and privacy for MapReduce. In: Proceedings USENIX Symposium on Networked Systems Design and Implementation 297–312.