Verification of Information Flow and Access Control Policies with Dependent Types | IEEE Conference Publication | IEEE Xplore