The case for a secure multi-application smart card operating system, ISW '97: Proceedings of the First International Workshop on Information Security, pp.188-197, 1998. ,
DOI : 10.1007/BFb0030420
Multiapplication smart card: Towards an open smart card?, Information Security Technical Report, vol.14, issue.2, pp.70-78, 2009. ,
DOI : 10.1016/j.istr.2009.06.007
URL : https://hal.archives-ouvertes.fr/hal-00463223
A Paradigm Shift in Smart Card Ownership Model, 2010 International Conference on Computational Science and Its Applications, pp.191-200, 2010. ,
DOI : 10.1109/ICCSA.2010.52
A New Mandatory Secruity Policy Combining Secrecy and Integrity, IBM Thomas J. Watson Research Center Rep. RC, issue.97406, p.21717, 2000. ,
The Caernarvon secure embedded operating system, ACM SIGOPS Operating Systems Review, vol.42, issue.1, pp.32-39, 2008. ,
DOI : 10.1145/1341312.1341320
Which Trust Can Be Expected of the Common Criteria Certification at End-User Level? " in FGCN '07: Proceedings of the Future Generation Communication and Networking, pp.423-428, 2007. ,
Common Criteria for Information Technology Security Evaluation, Std. Version 2.2, Rev, p.256, 2004. ,
Firewall Mechanism in a User Centric Smart Card Ownership Model, Smart Card Research and Advanced Application, pp.118-132, 2010. ,
DOI : 10.1007/978-3-642-12510-2_9
URL : https://hal.archives-ouvertes.fr/hal-01056096
Applied cryptography): protocols, algorithms, and source code in C, 1995. ,