P. Bieber, J. Cazin, V. Wiels, G. Zanon, P. Girard et al., Checking Secure Interactions of Smart Card Applets, J. of Comp. Sec, vol.10, issue.4, pp.369-398, 2002.
DOI : 10.1007/10722599_1

L. Desmet, W. Joosen, F. Massacci, P. Philippaerts, F. Piessens et al., Security-by-contract on the .NET platform, Information Security Technical Report, vol.13, issue.1, pp.25-32, 2008.
DOI : 10.1016/j.istr.2008.02.001

N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan, Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code, Proc. of the 4th European PKI Workshop Theory and Practice (EUROPKI'07, 2007.
DOI : 10.1007/978-3-540-73408-6_21

D. Ghindici and I. Simplot, On practical information flow policies for javaenabled multiapplication smart cards, CARDIS 2008, pp.32-47, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00544952

P. Girard, Which security policy for multiplication smart cards?, USENIX Workshop on Smartcard Technology. USENIX Association, 1999.

L. Gong, G. Ellison, and M. Dageforde, Inside Java 2 platform security: architecture , API design, and implementation, 2003.

E. Hubbers, M. Oostdijk, and E. Poll, From Finite State Machines to Provably Correct Java Card Applets, SEC'03, 2003.
DOI : 10.1007/978-0-387-35691-4_47

M. Huisman, D. Gurov, C. Sprenger, and G. Chugunov, Checking Absence of Illicit Applet Interactions: A??Case??Study, FASE'04, pp.84-98, 2004.
DOI : 10.1007/978-3-540-24721-0_6

G. Inc, GlobalPlatform Card Specification, Version 2.2. Specification 2.2, 2006.

S. Microsystems, Runtime Environment Specification Java Card T M Platform, Version 3.0, Connected edition. Specification 3.0, Sun Microsystems, 2008.

W. Mostowski and E. Poll, Malicious code on java card smart cards: attacks and countermeasures, CARDIS 2008, pp.1-16, 2008.

G. C. Necula, Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.106-119, 1997.
DOI : 10.1145/263699.263712

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979

G. Schellhorn, W. Reif, A. Schairer, P. Karger, V. Austel et al., Verification of a Formal Security Model for Multiapplicative Smart Cards, ESORICS'00, 2000.
DOI : 10.1007/10722599_2

R. Sekar, V. N. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. Duvarney, Modelcarrying code: a practical approach for safe execution of untrusted applications, Proc. of the 19th ACM Symp. on Operating Syst. Princ, pp.15-28, 2003.

C. Sprenger, D. Gurov, and M. Huisman, Simulation logic, applets and compositional verification, p.7, 2003.
URL : https://hal.archives-ouvertes.fr/inria-00071692

B. S. Yee, A Sanctuary for Mobile Agents, Secure Internet Programming, pp.261-273, 1999.
DOI : 10.1007/3-540-48749-2_12