K. Markantonakis, The case for a secure multi-application smart card operating system, ISW '97: Proceedings of the First International Workshop on Information Security, pp.188-197, 1998.
DOI : 10.1007/BFb0030420

D. Sauveron, Multiapplication smart card: Towards an open smart card?, Information Security Technical Report, vol.14, issue.2, pp.70-78, 2009.
DOI : 10.1016/j.istr.2009.06.007

URL : https://hal.archives-ouvertes.fr/hal-00463223

R. N. Akram, K. Markantonakis, and K. Mayes, A Paradigm Shift in Smart Card Ownership Model, 2010 International Conference on Computational Science and Its Applications, pp.191-200, 2010.
DOI : 10.1109/ICCSA.2010.52

P. A. Karger, V. R. Austel, and D. C. , A New Mandatory Secruity Policy Combining Secrecy and Integrity, IBM Thomas J. Watson Research Center Rep. RC, issue.97406, p.21717, 2000.

D. C. Toll, P. A. Karger, E. R. Palmer, S. K. Mcintosh, and S. Weber, The Caernarvon secure embedded operating system, ACM SIGOPS Operating Systems Review, vol.42, issue.1, pp.32-39, 2008.
DOI : 10.1145/1341312.1341320

D. Sauveron and P. Dusart, Which Trust Can Be Expected of the Common Criteria Certification at End-User Level? " in FGCN '07: Proceedings of the Future Generation Communication and Networking, pp.423-428, 2007.

I. Iec and . Standard, Common Criteria for Information Technology Security Evaluation, Std. Version 2.2, Rev, p.256, 2004.

R. N. Akram, K. Markantonakis, and K. Mayes, Firewall Mechanism in a User Centric Smart Card Ownership Model, Smart Card Research and Advanced Application, pp.118-132, 2010.
DOI : 10.1007/978-3-642-12510-2_9

URL : https://hal.archives-ouvertes.fr/hal-01056096

B. Schneier, Applied cryptography): protocols, algorithms, and source code in C, 1995.