Checking Secure Interactions of Smart Card Applets, J. of Comp. Sec, vol.10, issue.4, pp.369-398, 2002. ,
DOI : 10.1007/10722599_1
Security-by-contract on the .NET platform, Information Security Technical Report, vol.13, issue.1, pp.25-32, 2008. ,
DOI : 10.1016/j.istr.2008.02.001
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code, Proc. of the 4th European PKI Workshop Theory and Practice (EUROPKI'07, 2007. ,
DOI : 10.1007/978-3-540-73408-6_21
On practical information flow policies for javaenabled multiapplication smart cards, CARDIS 2008, pp.32-47, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00544952
Which security policy for multiplication smart cards?, USENIX Workshop on Smartcard Technology. USENIX Association, 1999. ,
Inside Java 2 platform security: architecture , API design, and implementation, 2003. ,
From Finite State Machines to Provably Correct Java Card Applets, SEC'03, 2003. ,
DOI : 10.1007/978-0-387-35691-4_47
Checking Absence of Illicit Applet Interactions: A??Case??Study, FASE'04, pp.84-98, 2004. ,
DOI : 10.1007/978-3-540-24721-0_6
GlobalPlatform Card Specification, Version 2.2. Specification 2.2, 2006. ,
Runtime Environment Specification Java Card T M Platform, Version 3.0, Connected edition. Specification 3.0, Sun Microsystems, 2008. ,
Malicious code on java card smart cards: attacks and countermeasures, CARDIS 2008, pp.1-16, 2008. ,
Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.106-119, 1997. ,
DOI : 10.1145/263699.263712
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979
Verification of a Formal Security Model for Multiapplicative Smart Cards, ESORICS'00, 2000. ,
DOI : 10.1007/10722599_2
Modelcarrying code: a practical approach for safe execution of untrusted applications, Proc. of the 19th ACM Symp. on Operating Syst. Princ, pp.15-28, 2003. ,
Simulation logic, applets and compositional verification, p.7, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00071692
A Sanctuary for Mobile Agents, Secure Internet Programming, pp.261-273, 1999. ,
DOI : 10.1007/3-540-48749-2_12