For each of the three papers: 1. Write a one-paragraph summary of the paper. 2. Comment on one thing you think is particularly worth noting and/or discussing about the paper. B. Give an example security application of information flow as you envision. What are the security benefits of your approach? What are the challenges?