메뉴 건너뛰기




Volumn 2422, Issue , 2002, Pages 41-59

Tool-assisted specification and verification of the JavaCard platform

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTERS;

EID: 33745220434     PISSN: 03029743     EISSN: 16113349     Source Type: Journal    
DOI: 10.1007/3-540-45719-4_4     Document Type: Article
Times cited : (10)

References (47)
  • 1
    • 33750183829 scopus 로고    scopus 로고
    • Elan for equational reasoning in coq
    • J. Despeyroux, editor, Rapport Technique INRIA
    • C. Alvarado and Q.-H. Nguyen. elan for equational reasoning in coq. In J. Despeyroux, editor, Proceedings of LFM’00, 2000. Rapport Technique INRIA.
    • (2000) Proceedings of LFM’00
    • Alvarado, C.1    Nguyen, Q.-H.2
  • 12
    • 0030641947 scopus 로고    scopus 로고
    • Automated theorem proving by test set induction
    • A. Bouhoula. Automated theorem proving by test set induction. Journal of Symbolic Computation, 23(1):47-77, January 1997.
    • (1997) Journal of Symbolic Computation , vol.23 , Issue.1 , pp. 47-77
    • Bouhoula, A.1
  • 13
    • 84937428334 scopus 로고    scopus 로고
    • Development of an Embedded Verifier for JavaCard ByteCode using Formal Methods
    • L.-H. Eriksson and P. A. Lindsay, editors, To appear
    • L. Casset. Development of an Embedded Verifier for JavaCard ByteCode using Formal Methods. In L.-H. Eriksson and P. A. Lindsay, editors, Proceedings of FME’02, Lecture Notes in Computer Science, 2002. To appear.
    • (2002) Proceedings of FME’02, Lecture Notes in Computer Science
    • Casset, L.1
  • 15
    • 84894630337 scopus 로고    scopus 로고
    • A Formal Specification of the Java Byte Code Semantics using the B Method
    • B. Jacobs, G. T. Leavens, P. Müller, and A. Poetzsch-Heffter, editors, . Technical Report, Fernuniversität Hagen
    • L. Casset and J.-L. Lanet. A Formal Specification of the Java Byte Code Semantics using the B Method. In B. Jacobs, G. T. Leavens, P. Müller, and A. Poetzsch-Heffter, editors, Proceedings of Formal Techniques for Java Programs. Technical Report 251, Fernuniversität Hagen, 1999.
    • (1999) Proceedings of Formal Techniques for Java Programs , pp. 251
    • Casset, L.1    Lanet, J.-L.2
  • 21
    • 85018970442 scopus 로고    scopus 로고
    • Common Criteria. http://www.commoncriteria.org.
  • 22
    • 85018952335 scopus 로고    scopus 로고
    • e-Europe SmartCards. See http://eeurope-smartcards.org.
  • 23
  • 24
    • 84944136917 scopus 로고    scopus 로고
    • Formal modeling and verification of the java card security architecture: Fromst atic checkings to embedded applet execution, 2002
    • Marseille, 7-9 January 2002. Slides
    • E. Giménez and O. Ly. Formal modeling and verification of the java card security architecture: fromst atic checkings to embedded applet execution, 2002. Talk delivered at the Verificard’02 meeting, Marseille, 7-9 January 2002. Slides available at http://www-sop.inria.fr/lemme/verificard/2002/programme.html.
    • Talk Delivered at the Verificard’02 Meeting
    • Giménez, E.1    Ly, O.2
  • 25
    • 0000952504 scopus 로고    scopus 로고
    • Formalizing the Safety of Java, the Java Virtual Machine and Java Card
    • December
    • P. Hartel and L. Moreau. Formalizing the Safety of Java, the Java Virtual Machine and Java Card. ACM Computing Surveys, 33(4):517-558, December 2001.
    • (2001) ACM Computing Surveys , vol.33 , Issue.4 , pp. 517-558
    • Hartel, P.1    Moreau, L.2
  • 26
    • 85019011440 scopus 로고    scopus 로고
    • JavaCard Technology. http://java.sun.com/products/javacard.
  • 27
    • 85018958117 scopus 로고    scopus 로고
    • JML Specification Language. http://www.jmlspecs.org.
  • 33
    • 84958745294 scopus 로고    scopus 로고
    • Java bytecode verification: An overview
    • G. Berry, H. Comon, and A. Finkel, editors, Springer-Verlag
    • X. Leroy. Java bytecode verification: an overview. In G. Berry, H. Comon, and A. Finkel, editors, Proceedings of CAV’01, volume 2102 of Lecture Notes in Computer Science, pages, 265-285. Springer-Verlag, 2001.
    • (2001) Proceedings of CAV’01, Volume 2102 of Lecture Notes in Computer Science , pp. 265-285
    • Leroy, X.1
  • 34
    • 84937425434 scopus 로고    scopus 로고
    • On-card bytecode verification for Java card
    • I. Attali and T. Jensen, editors, Springer-Verlag
    • X. Leroy. On-card bytecode verification for Java card. In I. Attali and T. Jensen, editors, Proceedings e-Smart 2001, volume 2140, pages, 150-164. Springer-Verlag, 2001.
    • (2001) Proceedings E-Smart 2001 , vol.2140 , pp. 150-164
    • Leroy, X.1
  • 36
    • 0030685617 scopus 로고    scopus 로고
    • Proof-carrying code
    • ACM Press
    • G. C. Necula. Proof-carrying code. In Proceedings of POPL’97, pages, 106-119. ACM Press, 1997.
    • (1997) Proceedings of POPL’97 , pp. 106-119
    • Necula, G.C.1
  • 39
    • 84958764832 scopus 로고    scopus 로고
    • Byte Code Verification for Java Smart Cards Based on Model Checking
    • J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Springer-Verlag
    • J. Posegga and H. Vogt. Byte Code Verification for Java Smart Cards Based on Model Checking. In J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Proceedings of the ESORICS’98, volume 1485 of Lecture Notes in Computer Science, pages, 175-190. Springer-Verlag, 1998.
    • (1998) Proceedings of the ESORICS’98, Volume 1485 of Lecture Notes in Computer Science , pp. 175-190
    • Posegga, J.1    Vogt, H.2
  • 40
    • 84894628189 scopus 로고    scopus 로고
    • A B Model for Ensuring Soundness of a Large Subset of the Java Card Virtual Machine
    • S. Gnesi, I. Schieferdecker, and A. Rennoch, editors
    • A. Requet. A B Model for Ensuring Soundness of a Large Subset of the Java Card Virtual Machine. In S. Gnesi, I. Schieferdecker, and A. Rennoch, editors, Proceedings of FMICS’00, pages, 29-46, 2000.
    • (2000) Proceedings of FMICS’00 , pp. 29-46
    • Requet, A.1
  • 43
    • 85018987760 scopus 로고    scopus 로고
    • Palo Alto/CA, USA
    • Technical White Paper
    • Sun Microsystems, Inc., Palo Alto/CA, USA. Java Card Platform Security, 2001. Technical White Paper.
    • (2001) Java Card Platform Security


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.