메뉴 건너뛰기




Volumn 153, Issue , 2004, Pages 1-16

Enforcing high-level security properties for applets

Author keywords

Security; Smart devices; Specification; Verification

Indexed keywords

MODELING LANGUAGES; SECURITY SYSTEMS; SMART CARDS; SPECIFICATION LANGUAGES; SPECIFICATIONS; VERIFICATION;

EID: 84902517836     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (22)
  • 1
    • 19144368375 scopus 로고    scopus 로고
    • Jass - Java with Assertions
    • K. Havelund and G.Roşu editors, Elsevier Publishing
    • D. Bartetzko, C. Fischer, M. Möller, and H. Wehrheim. Jass - Java with Assertions. In K. Havelund and G.Roşu editors, ENTCS, volume 55(2). Elsevier Publishing, 2001.
    • (2001) ENTCS , vol.55 , Issue.2
    • Möller, D.1    Bartetzko, C.2    Fischer, M.3    Wehrheim, H.4
  • 5
    • 25144522619 scopus 로고    scopus 로고
    • Formal Methods for Smart Cards: An experience report
    • Technical Report NIII-R0316, NIII, University of Nijmegen, To appear in
    • C. Breunesse, N. Cataño, M. Huisman, and B. Jacobs. Formal Methods for Smart Cards: an experience report. Technical Report NIII-R0316, NIII, University of Nijmegen, 2003. To appear in Science of Computer Programming.
    • (2003) Science of Computer Programming
    • Huisman, C.1    Breunesse, N.2    Cataño, M.3    Jacobs, B.4
  • 7
    • 35248874920 scopus 로고    scopus 로고
    • Java Applet Correctness: A Developer-Oriented Approach
    • number 2805 in LNCS, Springer
    • L. Burdy, A. Requet, and J.-L. Lanet. Java Applet Correctness: a Developer-Oriented Approach. In Formal Methods (FME'03), number 2805 in LNCS, pages 422-439. Springer, 2003.
    • (2003) Formal Methods (FME'03) , pp. 422-439
    • Burdy, A.1    Requet, L.2    Lanet, J.-L.3
  • 8
    • 0033687342 scopus 로고    scopus 로고
    • Enforcing trace properties by program transformation
    • ACM Press
    • T. Colcombet and P. Fradet. Enforcing trace properties by program transformation. In Proceedings of POPL'00, pages 54-66. ACM Press, 2000.
    • (2000) Proceedings of POPL'00 , pp. 54-66
    • Colcombet, T.1    Fradet, P.2
  • 18
    • 0030685617 scopus 로고    scopus 로고
    • Proof-Carrying Code
    • ACM Press
    • G.C. Necula. Proof-Carrying Code. In Proceedings of POPL'97, pages 106-119. ACM Press, 1997.
    • (1997) Proceedings of POPL'97 , pp. 106-119
    • Necula, G.C.1
  • 19
    • 0003970441 scopus 로고    scopus 로고
    • Technical Report TR99-1759, Cornell University, October
    • F.B. Schneider. Enforceable security policies. Technical Report TR99-1759, Cornell University, October 1999.
    • (1999) Enforceable Security Policies
    • Schneider, F.B.1
  • 20
    • 18944384831 scopus 로고    scopus 로고
    • Testing and monitoring model-based generated program
    • of ENTCS. Elsevier
    • L. Tan, J. Kim, and I. Lee. Testing and monitoring model-based generated program. In Proceeding of RV'03, volume 89 of ENTCS. Elsevier, 2003.
    • (2003) Proceeding of RV'03 , vol.89
    • Kim, L.1    Tan, J.2    Lee, I.3
  • 21
    • 84944065753 scopus 로고    scopus 로고
    • Extending JML Specifications with Temporal Logic
    • H. Kirchner and C. Ringeissen, editors, number 2422 in LNCS, Springer
    • K. Trentelman and M. Huisman. Extending JML Specifications with Temporal Logic. In H. Kirchner and C. Ringeissen, editors, Algebraic Methodology And Software Technology (AMAST'02), number 2422 in LNCS, pages 334-348. Springer, 2002.
    • (2002) Algebraic Methodology and Software Technology (AMAST'02) , pp. 334-348
    • Trentelman, K.1    Huisman, M.2
  • 22
    • 0033726685 scopus 로고    scopus 로고
    • A Type System for Expressive Security Policies
    • ACM Press
    • D. Walker. A Type System for Expressive Security Policies. In Proceedings of POPL '00, pages 254-267. ACM Press, 2000.
    • (2000) Proceedings of POPL '00 , pp. 254-267
    • Walker, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.