Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs Article in International Journal of Information Security (June 2009)