Information Flow.- Faceted Dynamic Information Flow via Control and Data Monads.- Asymmetric Secure Multi-execution with Declassification.- A Taxonomy of Information Flow Monitors.- On Improvements of Low-Deterministic Security.- Tool Demonstration: JOANA.- Models and Applications.- Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study.- Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.- Correct Audit Logging: Theory and Practice.- The Value of Attack-Defence Diagrams.- Protocols.- Composing protocols with randomized actions.- Bounding the number of agents, for equivalence too.- AIF-omega: Set-Based Protocol Abstraction with Countable Families.- Computational Soundness Results for Stateful Applied pi Calculus.