The following publications are possibly variants of this publication:
- Building secure web applications with automatic partitioningStephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng. CACM, 52(2):79-87, 2009. [doi]
- Secure web application via automatic partitioningStephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng. sosp 2007: 31-44 [doi]
- BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content ServiceI Luk Kim, Weihang Wang 0001, Yonghwi Kwon 0001, Xiangyu Zhang 0001. ICSE 2023: 448-459 [doi]
- Easy Flow: New Generation Business Process ModelQi Sui, Dongqing Yang, Tengjiao Wang. apweb 2009: 138-147 [doi]
- Composition of executable business process models by combining business rules and process flowsSunjae Lee, Tae-young Kim, Dongwoo Kang, Kwangsoo Kim, Jae Yeol Lee. eswa, 33(1):221-229, 2007. [doi]
- Mash-IF: Practical information-flow control within client-side mashupsZhou Li, Kehuan Zhang, Xiaofeng Wang. dsn 2010: 251-260 [doi]