M. Cristiá and P. E. Mata, Runtime enforcement of noninterference by duplicating processes and their memories, Workshop de Seguridad Informática WSEGI, 2009.

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

L. Georget, M. Jaume, G. Piolle, F. Tronel, and V. Viet-triem-tong, Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux, 2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE), 2017.
DOI : 10.1109/FormaliSE.2017.1

URL : https://hal.archives-ouvertes.fr/hal-01535862

C. Hauser, Détection d'intrusion dans les systèmes distribués par propagation de teinte au niveau noyau, 2013.

M. Jaume, R. Andriatsimandefitra, V. Viet-triem-tong, and L. Mé, Secure States versus Secure Executions, International Conference on Information Systems Security, 2013.
DOI : 10.1007/978-3-642-45204-8_11

URL : https://hal.archives-ouvertes.fr/hal-01083384

M. Krohn and E. Tromer, Noninterference for a Practical DIFC-Based Operating System, 2009 30th IEEE Symposium on Security and Privacy, pp.61-76, 2009.
DOI : 10.1109/SP.2009.23

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek et al., Information flow control for standard OS abstractions, ACM SIGOPS symposium on Operating systems principles, pp.321-334, 2007.
DOI : 10.1145/1323293.1294293

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. E. Porter, M. D. Bond, I. Roy, K. S. Mckinley, and E. Witchel, Practical Fine-Grained Information Flow Control Using Laminar, ACM Transactions on Programming Languages and Systems, vol.37, issue.1, pp.1-51, 2014.
DOI : 10.1109/MICRO.2004.31

I. Roy and D. Porter, Laminar, p.26, 2014.

I. Roy, D. E. Porter, M. D. Bond, K. S. Mckinley, and E. Witchel, Laminar: Practical Fine-grained Decentralized Information Flow Control, Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.63-74, 2009.

C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-hartman, Linux security modules: general security support for the linux kernel, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp.17-31, 2002.
DOI : 10.1109/FITS.2003.1264934

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Zimmermann, L. Mé, and C. Bidan, Experimenting with a policy-based HIDS based on an information flow control model, 19th Annual Computer Security Applications Conference, 2003. Proceedings., 2003.
DOI : 10.1109/CSAC.2003.1254341

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=