1. Dependent types at work;Bove,2008
2. A lattice model of secure information flow;Denning;Commun. ACM,1976
3. Security policies and security models;Goguen,1982
4. On flow-sensitive security types;Hunt;SIGPLAN Not.,2006
5. From exponential to polynomial-time security typing via principal types;Hunt,2011