D. Deville, A. Galland, G. Grimaud, and S. Jean, Smart card operating systems: Past, present and future, Proceedings of the 5 th NORDU/USENIX Conference, 2003.

D. Sauveron, Multiapplication smart card: Towards an open smart card?, Information Security Technical Report, vol.14, issue.2, pp.70-78, 2009.
DOI : 10.1016/j.istr.2009.06.007

URL : https://hal.archives-ouvertes.fr/hal-00463223

S. Chaumette and D. Sauveron, New Security Problems Raised by Open Multiapplication Smart Cards, LaBRI, Université Bordeaux, vol.1, pp.1332-1336, 2004.

Z. Chen, Java Card Technology for Smart Cards: Architecture and Programmer's Guide, 2000.

M. Montgomery and K. Krishna, Secure Object Sharing in Java Card, WOST'99: Proceedings of the USENIX Workshop on Smartcard Technology, pp.14-14, 1999.

M. Éluard, T. P. Jensen, and E. Denney, An Operational Semantics of the Java Card Firewall, E-SMART '01: Proceedings of the International Conference on Research in Smart Cards, pp.95-110, 2001.

C. Bernardeschi and L. Martini, Enforcement of Applet Boundaries in Java Card Systems, IASTED Conf. on Software Engineering and Applications, pp.96-101, 2004.

J. Card and P. Specification, Application Programming Interface Runtime Environment Specification, Virtual Machine Specification, Sun Microsystem Inc Std. Version 2.2.2, 2006.

. Multos, The Multos Specification

M. Huisman, D. Gurov, C. Sprenger, and G. Chugunov, Checking Absence of Illicit Applet Interactions: A??Case??Study, Fundamental Approaches to Software Engineering, 2004.
DOI : 10.1007/978-3-540-24721-0_6

W. Mostowski and E. Poll, Malicious Code on Java Card Smartcards: Attacks and Countermeasures, CARDIS '08: Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, pp.1-16, 2008.
DOI : 10.1007/978-3-540-30569-9_7

M. Éluard and T. Jensen, Secure Object Flow Analysis for Java Card, CARDIS'02: Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference, pp.11-11, 2002.

P. Bieber, J. Cazin, A. E. Marouani, P. Girard, J. L. Lanet et al., The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow, JavaCard '00: Revised Papers from the First International Workshop on Java on Smart Cards: Programming and Security, pp.25-37, 2001.
DOI : 10.1007/3-540-45165-X_3

R. N. Akram, K. Markantonakis, and K. Mayes, Application Management Framework in User Centric Smart Card Ownership Model, The 10th International Workshop on Information Security Applications (WISA09), pp.20-35, 2009.
DOI : 10.1007/978-3-642-10838-9_3

P. Girard, Which Security Policy for Multiplication Smart Cards, WOST'99: Proceedings of the USENIX Workshop on Smartcard Technology, pp.3-3, 1999.

D. A. Basin, S. Friedrich, J. Posegga, and H. Vogt, Java Bytecode Verification by Model Checking, CAV '99: Proceedings of the 11th International Conference on Computer Aided Verification, pp.491-494, 1999.
DOI : 10.1007/3-540-48683-6_43

D. A. Basin, S. Friedrich, and M. Gawkowski, Verified Bytecode Model Checkers, TPHOLs '02: Proceedings of the 15th International Conference on Theorem Proving in Higher Order Logics, pp.47-66, 2002.
DOI : 10.1007/3-540-45685-6_5

C. Colby, P. Lee, G. C. Necula, F. Blau, M. Plesko et al., A Certifying Compiler for Java, PLDI '00: Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation, pp.95-107, 2000.

G. Barthe, G. Dufay, L. Jakubiec, S. Melo, and . Sousa, A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines, VMCAI '02: Revised Papers from the Third International Workshop on Verification, Model Checking, and Abstract Interpretation, pp.32-45, 2002.
DOI : 10.1007/3-540-47813-2_3

E. Börger and W. Schulte, Defining the Java Virtual Machine as platform for provably correct Java compilation, MFCS '98: Proceedings of the 23rd International Symposium on Mathematical Foundations of Computer Science, pp.17-35, 1998.
DOI : 10.1007/BFb0055755

B. Schneier, Applied cryptography): protocols, algorithms, and source code in C, 1995.

D. Deville and G. Grimaud, Building an "impossible" verifier on a java card, WIESS'02: Proceedings of the 2nd conference on Industrial Experiences with Systems Software, pp.2-2, 2002.

K. Markantonakis and K. Mayes, A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography, CMS 2004 -Eight IFIP TC- 6-11 Conference on Communications and Multimedia, pp.79-96, 2004.
DOI : 10.1007/0-387-24486-7_6