메뉴 건너뛰기




Volumn 1895, Issue , 2000, Pages 1-16

Checking secure interactions of smart card applets

Author keywords

[No Author keywords available]

Indexed keywords

MODEL CHECKING;

EID: 84944029270     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10722599_1     Document Type: Conference Paper
Times cited : (7)

References (18)
  • 1
    • 84974754345 scopus 로고
    • A Logical View of Secure Dependencies
    • P. Bieber and F. Cuppens. A Logical View of Secure Dependencies. Journal of Computer Security, 1(1):99-129, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 99-129
    • Bieber, P.1    Cuppens, F.2
  • 2
    • 0002613279 scopus 로고    scopus 로고
    • A type system for object initialization in the java byte code language
    • Stephen N. Freund and John C. Mitchell. A type system for object initialization in the java byte code language. In Proceedings of OOPSLA 98, 1998.
    • (1998) Proceedings of OOPSLA 98
    • Freund, S.N.1    Mitchell, J.C.2
  • 6
    • 19144365408 scopus 로고    scopus 로고
    • Technical Report DSSE-TR-98-1, Declarative systems and Software Engineering group, University of Southampton,Highfield, Southampton SO17 1BJ, UK
    • Pieter H. Hartel, Michael J. Butler, and Moshe Levy. The operational semantics of a java secure processor. Technical Report DSSE-TR-98-1, Declarative systems and Software Engineering group, University of Southampton,Highfield, Southampton SO17 1BJ, UK, 1998.
    • (1998) The Operational Semantics of a Java Secure Processor
    • Hartel, P.H.1    Butler, M.J.2    Levy, M.3
  • 14
    • 0011272372 scopus 로고    scopus 로고
    • Offline verification for java byte code using a model checker
    • Springer
    • Joachim Posegga and Harald Vogt. Offline verification for java byte code using a model checker. In Proceedings of ESORICS, number 1485 in LNCS. Springer, 1998.
    • (1998) Proceedings of ESORICS
    • Posegga, J.1    Vogt, H.2
  • 15
    • 0002773789 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • G. Smith and D.M. Volpano. Secure information flow in a multi-threaded imperative language. In Proceedings of POPL, 1998.
    • (1998) Proceedings of POPL
    • Smith, G.1    Volpano, D.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.