[{"text":"\n\n\nShumpei Akai , Shigeru Chiba , Muga Nishizawa, Region pointcut for AspectJ, Proceedings of the 8th workshop on Aspects, components, and patterns for infrastructure software, March 02-02, 2009, Charlottesville, Virginia, USA   [doi>10.1145/1509276.1509287]\n\n","citation":"1509287","doi":"http://doi.acm.org/10.1145/1509276.1509287"},{"text":"\n\n\nThomas H. Austin , Cormac Flanagan, Efficient purely-dynamic information flow analysis, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, June 15-21, 2009, Dublin, Ireland   [doi>10.1145/1554339.1554353]\n\n","citation":"1554353","doi":"http://doi.acm.org/10.1145/1554339.1554353"},{"text":"\n\nJ. Bacon, D. Eyers, T. F. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch. Information Flow Control for secure cloud computing. submitted to: IEEE Transactions on Network and Service Management, Special Issue on Management of Cloud Services, 2014.\n\n"},{"text":"\n\nD. Bell. The Bell-LaPadula model. Journal of computer security, 4 (2): 3, 1996.\n\n"},{"text":"\n\nK. Benitez and B. Malin. Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association, 17 (2): 169--177, 2010.\n\n"},{"text":"\n \nK. J. Biba. Integrity considerations for secure computer systems. Technical report, DTIC Document, 1977.\n\n"},{"text":"\n\n\nWinnie Cheng , Dan R. K. Ports , David Schultz , Victoria Popic , Aaron Blankstein , James Cowling , Dorothy Curtis , Liuba Shrira , Barbara Liskov, Abstractions for usable information flow control in Aeolus, Proceedings of the 2012 USENIX conference on Annual Technical Conference, p.12-12, June 13-15, 2012, Boston, MA \n\n","citation":"2342833"},{"text":"\n\n\nDorothy Elizabeth Robling Denning, Secure information flow in computer systems., Purdue University, West Lafayette, IN, 1975 \n\n","citation":"907362"},{"text":"\n\n\nDorothy E. Denning, A lattice model of secure information flow, Communications of the ACM, v.19 n.5, p.236-243, May 1976   [doi>10.1145/360051.360056]\n\n","citation":"360056","doi":"http://doi.acm.org/10.1145/360051.360056"},{"text":"\n\n\nDorothy E. Denning , Peter J. Denning, Certification of programs for secure information flow, Communications of the ACM, v.20 n.7, p.504-513, July 1977   [doi>10.1145/359636.359712]\n\n","citation":"359712","doi":"http://doi.acm.org/10.1145/359636.359712"},{"text":"\n\n\nBart De Win , Bart Vanhaute , Bart De Decker, Security Through Aspect-Oriented Programming, Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security, p.125-138, November 26-27, 2001 \n\n","citation":"710569"},{"text":"\n\n\nCynthia Disenfeld , Shmuel Katz, A closer look at aspect interference and cooperation, Proceedings of the 11th annual international conference on Aspect-oriented Software Development, March 25-30, 2012, Potsdam, Germany   [doi>10.1145/2162049.2162063]\n \n","citation":"2162063","doi":"http://doi.acm.org/10.1145/2162049.2162063"},{"text":"\n\n\nPetros Efstathopoulos , Maxwell Krohn , Steve VanDeBogart , Cliff Frey , David Ziegler , Eddie Kohler , David Mazières , Frans Kaashoek , Robert Morris, Labels and event processes in the asbestos operating system, Proceedings of the twentieth ACM symposium on Operating systems principles, October 23-26, 2005, Brighton, United Kingdom   [doi>10.1145/1095810.1095813]\n\n","citation":"1095813","doi":"http://doi.acm.org/10.1145/1095810.1095813"},{"text":"\n\n\nEduardo Figueiredo , Nelio Cacho , Claudio Sant'Anna , Mario Monteiro , Uira Kulesza , Alessandro Garcia , Sérgio Soares , Fabiano Ferrari , Safoora Khan , Fernando Castor Filho , Francisco Dantas, Evolving software product lines with aspects: an empirical study on design stability, Proceedings of the 30th international conference on Software engineering, May 10-18, 2008, Leipzig, Germany   [doi>10.1145/1368088.1368124]\n\n","citation":"1368124","doi":"http://doi.acm.org/10.1145/1368088.1368124"},{"text":"\n\nM. Gyung, S. McCamant, P. Poosankam, and D. Song. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2011. Internet Society.\n\n"},{"text":"\n\n\nBruno Harbulot , John R. Gurd, A join point for loops in AspectJ, Proceedings of the 5th international conference on Aspect-oriented software development, March 20-24, 2006, Bonn, Germany   [doi>10.1145/1119655.1119666]\n\n","citation":"1119666","doi":"http://doi.acm.org/10.1145/1119655.1119666"},{"text":"\n\n\nPetr Hosek , Matteo Migliavacca , Ioannis Papagiannis , David M. Eyers , David Evans , Brian Shand , Jean Bacon , Peter Pietzuch, SafeWeb: a middleware for securing ruby-based web applications, Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware, December 12-16, 2011, Lisbon, Portugal   [doi>10.1007/978-3-642-25821-3_25]\n\n","citation":"2188495"},{"text":"\n\nS. Jajodia and B. Kogan. Integrating an object-oriented data model with multilevel security. In Proceedings, IEEE Symposium on Security and Privacy, pages 76--85, 1990.\n\n"},{"text":"\n\nS. Jajodia, B. Kogan, and R. Sandhu. A multilevel-secure object-oriented data model. Abrams et al.{AJP95}, 1995.\n\n"},{"text":"\n\n\nVineeth Kashyap , Ben Wiedermann , Ben Hardekopf, Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach, Proceedings of the 2011 IEEE Symposium on Security and Privacy, p.413-428, May 22-25, 2011   [doi>10.1109/SP.2011.19]\n\n","citation":"2006778"},{"text":"\n\n\nChristian Kastner , Sven Apel , Don Batory, A Case Study Implementing Features Using AspectJ, Proceedings of the 11th International Software Product Line Conference, p.223-232, September 10-14, 2007   [doi>10.1109/SPLC.2007.5]\n\n","citation":"1308204"},{"text":"\n\nG. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-Oriented Programming. Springer, 1997.\n\n"},{"text":"\n\n\nGregor Kiczales , Erik Hilsdale , Jim Hugunin , Mik Kersten , Jeffrey Palm , William G. Griswold, An Overview of AspectJ, Proceedings of the 15th European Conference on Object-Oriented Programming, p.327-353, June 18-22, 2001 \n\n","citation":"680006"},{"text":"\n\n\nMaxwell Krohn , Alexander Yip , Micah Brodsky , Natan Cliffer , M. Frans Kaashoek , Eddie Kohler , Robert Morris, Information flow control for standard OS abstractions, ACM SIGOPS Operating Systems Review, v.41 n.6, December 2007   [doi>10.1145/1323293.1294293]\n\n","citation":"1294293","doi":"http://doi.acm.org/10.1145/1323293.1294293"},{"text":"\n\n\nLap Chung Lam , Tzi-cker Chiueh, A General Dynamic Information Flow Tracking Framework for Security Applications, Proceedings of the 22nd Annual Computer Security Applications Conference, p.463-472, December 11-15, 2006   [doi>10.1109/ACSAC.2006.6]\n\n","citation":"1191901"},{"text":"\n\n\nButler W. Lampson, A note on the confinement problem, Communications of the ACM, v.16 n.10, p.613-615, Oct. 1973   [doi>10.1145/362375.362389]\n\n","citation":"362389","doi":"http://doi.acm.org/10.1145/362375.362389"},{"text":"\n\n\nSteven B. Lipner, A comment on the confinement problem, ACM SIGOPS Operating Systems Review, v.9 n.5, p.192-196, November 1975   [doi>10.1145/1067629.806537]\n\n","citation":"806537","doi":"http://doi.acm.org/10.1145/1067629.806537"},{"text":"\n\n\nMartin Lippert , Cristina Videira Lopes, A study on exception detection and handling using aspect-oriented programming, Proceedings of the 22nd international conference on Software engineering, p.418-427, June 04-11, 2000, Limerick, Ireland   [doi>10.1145/337180.337229]\n\n","citation":"337229","doi":"http://doi.acm.org/10.1145/337180.337229"},{"text":"\n\n\nFlorent Marchand de Kerchove , Jacques Noyé , Mario Südholt, Aspectizing JavaScript security, Proceedings of the 3rd workshop on Modularity in systems software, March 25-25, 2013, Fukuoka, Japan   [doi>10.1145/2451613.2451616]\n\n","citation":"2451616","doi":"http://doi.acm.org/10.1145/2451613.2451616"},{"text":"\n\nH. Masuhara and K. Kawauchi. Dataflow pointcut in Aspect-Oriented Programming. In Proceedings, First Asian Symposium on Programming Languages and Systems, APLAS, pages 105--121. Springer, 2003.\n\n"},{"text":"\n\n\nMatteo Migliavacca , Ioannis Papagiannis , David M. Eyers , Brian Shand , Jean Bacon , Peter Pietzuch, DEFCON: high-performance event processing with information security, Proceedings of the 2010 USENIX conference on USENIX annual technical conference, p.1-1, June 23-25, 2010, Boston, MA \n\n","citation":"1855841"},{"text":"\n\nA. Mourad, M.-A. Laverdière, and M. Debbabi. An aspect-oriented approach for the systematic security hardening of code. Computers & Security, 27 (3): 101--114, 2008.\n\n"},{"text":"\n\n\nAndrew C. Myers, JFlow: practical mostly-static information flow control, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, p.228-241, January 20-22, 1999, San Antonio, Texas, USA   [doi>10.1145/292540.292561]\n\n","citation":"292561","doi":"http://doi.acm.org/10.1145/292540.292561"},{"text":"\n\nK. Padayachee, J. Eloff, and J. Bishop. Aspect-oriented information flow control, unpublished.\n\n"},{"text":"\n\nT. Pasquier, B. Shand, and J. Bacon. Information Flow Control for a Medical Web Portal. In e-Society 2013. IADIS, March 2013.\n\n"},{"text":"\n\n\nRenaud Pawlak , Laurence Duchien , Lionel Seinturier, CompAr: ensuring safe around advice composition, Proceedings of the 7th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems, June 15-17, 2005, Athens, Greece   [doi>10.1007/11494881_11]\n\n","citation":"2144760"},{"text":"\n\nR. Ramachandran, D. J. Pearce, and I. Welch. AspectJ for multilevel security. ACP4IS '06, 20: 13--17, March 2006.\n\n"},{"text":"\n\n\nDorothy Elizabeth Robling Denning, Cryptography and data security, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1982 \n\n","citation":"539308"},{"text":"\n\n\nAlejandro Russo , Koen Claessen , John Hughes, A library for light-weight information-flow security in haskell, ACM SIGPLAN Notices, v.44 n.2, February 2009   [doi>10.1145/1543134.1411289]\n\n","citation":"1411289","doi":"http://doi.acm.org/10.1145/1543134.1411289"},{"text":"\n\n\nA. Sabelfeld , A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, v.21 n.1, p.5-19, September 2006   [doi>10.1109/JSAC.2002.806121]\n\n","citation":"2314769"},{"text":"\n\n\nAndrei Sabelfeld , Alejandro Russo, From dynamic to static and back: riding the roller coaster of information-flow control research, Proceedings of the 7th international Andrei Ershov Memorial conference on Perspectives of Systems Informatics, June 15-19, 2009, Novosibirsk, Russia   [doi>10.1007/978-3-642-11486-1_30]\n\n","citation":"2174799"},{"text":"\n\nJ. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proc. IEEE, 63 (9): 1278--1308, 1975.\n\n"},{"text":"\n\nV. Shah and F. Hill. An aspect-oriented security framework. In DARPA Information Survivability Conference and Exposition, 2003. Proceedings, volume 2, pages 143--145 vol.2, 2003.\n\n"},{"text":"\n\n\nOlaf Spinczyk , Andreas Gal , Wolfgang Schröder-Preikschat, AspectC++: an aspect-oriented extension to the C++ programming language, Proceedings of the Fortieth International Conference on Tools Pacific: Objects for internet, mobile and embedded applications, February 01, 2002, Sydney, Australia \n\n","citation":"564100"},{"text":"\n\n\nFriedrich Steimann, The paradoxical success of aspect-oriented programming, ACM SIGPLAN Notices, v.41 n.10, October 2006   [doi>10.1145/1167515.1167514]\n\n","citation":"1167514","doi":"http://doi.acm.org/10.1145/1167515.1167514"},{"text":"\n\n\nG. Edward Suh , Jae W. Lee , David Zhang , Srinivas Devadas, Secure program execution via dynamic information flow tracking, Proceedings of the 11th international conference on Architectural support for programming languages and operating systems, October 07-13, 2004, Boston, MA, USA   [doi>10.1145/1024393.1024404]\n\n","citation":"1024404","doi":"http://doi.acm.org/10.1145/1024393.1024404"},{"text":"\n\n\nRodolfo Toledo , Éric Tanter, Secure and modular access control with aspects, Proceedings of the 12th annual international conference on Aspect-oriented software development, March 24-29, 2013, Fukuoka, Japan   [doi>10.1145/2451436.2451456]\n\n","citation":"2451456","doi":"http://doi.acm.org/10.1145/2451436.2451456"},{"text":"\n\nT. Tourwé, J. Brichau, and K. Gybels. On the existence of the AOSD-evolution paradox. SPLAT: Software engineering Properties of Languages for Aspect Technologies, 2003.\n\n"},{"text":"\n\n\nNeil Vachharajani , Matthew J. Bridges , Jonathan Chang , Ram Rangan , Guilherme Ottoni , Jason A. Blome , George A. Reis , Manish Vachharajani , David I. August, RIFLE: An Architectural Framework for User-Centric Information-Flow Security, Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture, p.243-254, December 04-08, 2004, Portland, Oregon   [doi>10.1109/MICRO.2004.31]\n\n","citation":"1038947"},{"text":"\n\n\nJohn Viega , Jeffrey Voas, Can Aspect-Oriented Programming Lead to More Reliable Software?, IEEE Software, v.17 n.6, p.19-21, November 2000   [doi>10.1109/52.895163]\n\n","citation":"626197"},{"text":"\n\nJ. Viega, J. Bloch, and P. Chandra. Applying Aspect-Oriented Programming to security. Cutter IT Journal, 14 (2): 31--39, 2001.\n\n"},{"text":"\n\nP. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2007. Internet Society.\n\n"},{"text":"\n\n\nDennis Volpano , Geoffrey Smith, Eliminating Covert Flows with Minimum Typings, Proceedings of the 10th IEEE workshop on Computer Security Foundations, p.156, June 10-12, 1997 \n\n","citation":"795081"},{"text":"\n\nD. Wampler. Aquarium: AOP in Ruby. In Proceedings, Aspect Oriented Software Development (AOSD), volume 4, 2008.\n\n"},{"text":"\n\n\nHironori Washizaki , Atsuto Kubo , Tomohiko Mizumachi , Kazuki Eguchi , Yoshiaki Fukazawa , Nobukazu Yoshioka , Hideyuki Kanuka , Toshihiro Kodaka , Nobuhide Sugimoto , Yoichi Nagai , Rieko Yamamoto, AOJS: aspect-oriented javascript programming framework for web development, Proceedings of the 8th workshop on Aspects, components, and patterns for infrastructure software, March 02-02, 2009, Charlottesville, Virginia, USA   [doi>10.1145/1509276.1509285]\n\n","citation":"1509285","doi":"http://doi.acm.org/10.1145/1509276.1509285"},{"text":"\n\n\nAlexander Yip , Xi Wang , Nickolai Zeldovich , M. Frans Kaashoek, Improving application security with data flow assertions, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, October 11-14, 2009, Big Sky, Montana, USA   [doi>10.1145/1629575.1629604]\n\n","citation":"1629604","doi":"http://doi.acm.org/10.1145/1629575.1629604"},{"text":"\n\nA. Zambrano, A. Alvarez, J. Fabry, and S. Gordillo. Aspect Coordination for Web Applications in Java/AspectJ and Ruby/Aquarium. Proceedings, 28th International Conference of Chilean Computer Society, Nov. 2009.\n\n"},{"text":"\n\nS. Zdancewic. Challenges for information-flow security. In Proceedings of the 1st International Workshop on Programming Language Interference and Dependence (PLID'04), 2004.\n\n"},{"text":"\n\n\nNickolai Zeldovich , Silas Boyd-Wickizer , David Mazières, Securing distributed systems with information flow control, Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, p.293-308, April 16-18, 2008, San Francisco, California \n\n","citation":"1387610"}]