T. F. Pasquier, J. Bacon, and D. Eyers, FlowK: Information Flow Control for the Cloud, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, 2014.
DOI : 10.1109/CloudCom.2014.11

T. F. Pasquier, J. Singh, and J. Bacon, Information Flow Control for Strong Protection with Flexible Sharing in PaaS, 2015 IEEE International Conference on Cloud Engineering, 2015.
DOI : 10.1109/IC2E.2015.64

T. Pasquier and J. Powles, Expressing and Enforcing Location Requirements in the Cloud Using Information Flow Control, 2015 IEEE International Conference on Cloud Engineering, 2015.
DOI : 10.1109/IC2E.2015.71

K. Hon, C. Millard, C. Reed, J. Singh, I. Walden et al., Policy, legal and regulatory implications of a Europe-only cloud, International Journal of Law and Information Technology, vol.24, issue.3, p.6, 2014.
DOI : 10.1093/ijlit/eaw006

T. Pasquier, B. Shand, and J. Bacon, Information Flow Control for a Medical Web Portal, 2013.

J. Bacon, K. Moody, and W. Yao, A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security, vol.5, issue.4, pp.492-540, 2002.
DOI : 10.1145/581271.581276

J. Singh and J. Bacon, On middleware for emerging health services, Journal of Internet Services and Applications, vol.5, issue.1, pp.1-34, 2014.
DOI : 10.1136/jamia.1997.0040238

URL : http://doi.org/10.1186/1869-0238-5-6

S. Pearson and M. C. Mont, Sticky Policies: An Approach for Managing Privacy across Multiple Parties, Computer, vol.44, issue.9, 2011.
DOI : 10.1109/MC.2011.225

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

D. E. Bell and L. J. Lapadula, Secure Computer Systems: Mathematical Foundations and Model, The MITRE Corp, pp.74-244, 1973.

K. J. Biba, Integrity Considerations for Secure Computer Systems, MITRE Corp, 1977.

A. C. Myers and B. Liskov, A Decentralized Model for Information Flow Control, 17th Symposium on Operating Systems Principles (SOSP), pp.129-142, 1997.

A. Sabelfeld and A. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979

J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis et al., Information Flow Control for Secure Cloud Computing, IEEE Transactions on Network and Service Management, vol.11, issue.1, pp.76-89, 2014.
DOI : 10.1109/TNSM.2013.122313.130423

W. She, I. Yen, B. Thuraisingham, and S. Huang, Rule-Based Run-Time Information Flow Control in Service Cloud, 2011 IEEE International Conference on Web Services, pp.524-531, 2011.
DOI : 10.1109/ICWS.2011.35

I. Roy, S. T. Setty, A. Kilzer, V. Shmatikov, and E. Witchel, Airavat: Security and Privacy for MapReduce, 7th Symposium on Networked System Design and Implementation. USENIX, pp.297-312, 2010.

S. Akoush, L. Carata, R. Sohan, and A. Hopper, MrLazy: Lazy Runtime Label Propagation for MapReduce, 6th Workshop on Hot Topics in Cloud Computing (HotCloud). USENIX, 2014.

X. Xie, I. Ray, R. Adaikkalavan, and R. Gamble, Information flow control for stream processing in clouds, Proceedings of the 18th ACM symposium on Access control models and technologies, SACMAT '13, pp.89-100, 2013.
DOI : 10.1145/2462410.2463205

N. Kumar and R. Shyamasundar, Realizing Purpose-Based Privacy Policies Succinctly via Information-Flow Labels, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, pp.753-760, 2014.
DOI : 10.1109/BDCloud.2014.89

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

L. Giuri and P. Iglio, Role templates for content-based access control, Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.153-159, 1997.
DOI : 10.1145/266741.266773

E. Lupu and M. Sloman, Reconciling role based management and role based access control, Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.135-141, 1997.
DOI : 10.1145/266741.266770

D. Schultz and B. Liskov, IFDB, Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys '13, pp.43-56, 2013.
DOI : 10.1145/2465351.2465357

R. Sandhu, Separation of Duties in Computerized Information Systems, Database Security IV: Status and Prospects, 1990.

D. Brewer and M. Nash, The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989.
DOI : 10.1109/SECPRI.1989.36295

M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, Dryad, ACM SIGOPS Operating Systems Review, vol.41, issue.3, pp.59-72, 2007.
DOI : 10.1145/1272998.1273005

J. Singh, J. Bacon, J. Crowcroft, A. Madhavapeddy, T. Pasquier et al., Regional Clouds: Technical Considerations, 2014.

J. Singh, T. Pasquier, J. Bacon, and D. Eyers, Integrating Messaging Middleware and Information Flow Control, 2015 IEEE International Conference on Cloud Engineering, 2015.
DOI : 10.1109/IC2E.2015.13

D. Schoepe, D. Hedin, and A. Sabelfeld, SeLINQ: Tracking Information Across Application-Database Boundaries, 19th SIGPLAN Conference on Functional Programming, pp.25-38, 2014.

T. F. Pasquier, J. Bacon, and B. Shand, FlowR, Proceedings of the 13th international conference on Modularity, MODULARITY '14, 2014.
DOI : 10.1145/2577080.2577090

URL : https://www.repository.cam.ac.uk/bitstream/1810/245999/1/OA719_p37-pasquier.pdf

M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek et al., Information Flow Control for Standard OS Abstractions, Symposium on Operating Systems Principles, pp.321-334, 2007.

N. Zeldovich, S. Boyd-wickizer, and D. Mazì-eres, Securing Distributed Systems with Information Flow Control, 5th USENIX Symposium on Networked System Design and Implementation, pp.293-308, 2008.

A. Alghothami and F. Kammuller, Network Information Flow Control: Proof of Concept, 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp.2957-2962, 2013.
DOI : 10.1109/SMC.2013.504

Y. Mundada, A. Ramachandran, and N. Feamster, SilverLine, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, 2011.
DOI : 10.1145/2523649.2523663