A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, Enhancing Java ME Security Support with Resource Usage Monitoring, 10th International Conference on Information and Communications Security (ICICS08), no. 5308 in Lectures Notes in Computer Science, 2008.
DOI : 10.1145/359576.359585

F. Martinelli, P. Mori, T. Quillinan, and C. Schaefer, A Runtime Monitoring Environment for Mobile Java, 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, 2008.
DOI : 10.1109/ICSTW.2008.3

S. Microsystems-inc, The Connected Limited Device Configuration Specification, Java Standards Process JSR 139, 2003.

O. Kolsi and T. Virtanen, MIDP 2.0 security enhancements, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004.
DOI : 10.1109/HICSS.2004.1265679

M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua, Java for Mobile Devices: A Security Study, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.235-244, 2005.
DOI : 10.1109/CSAC.2005.34

M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua, Security Analysis of Mobile Java, 16th International Workshop on Database and Expert Systems Applications (DEXA'05), pp.231-235, 2005.
DOI : 10.1109/DEXA.2005.172

M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua, Security Evaluation of J2ME CLDC Embedded Java Platform., The Journal of Object Technology, vol.5, issue.2, pp.125-154, 2006.
DOI : 10.5381/jot.2006.5.2.a2

I. Ion, B. Dragovic, and B. Crispo, Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007.
DOI : 10.1109/ACSAC.2007.36

C. Riberio and P. Guedes, An access control language for security policies with complex contraints, Proceedings of Network and Distributed System Security Symphosium (NDSS01), 2001.

L. Desmet, W. Joosen, F. Massacci, P. Philippaerts, F. Piessens et al., Security-by-contract on the .NET platform, Information Security Technical Report, vol.13, issue.1, pp.25-32, 2008.
DOI : 10.1016/j.istr.2008.02.001

L. Desmet, W. Joosen, F. Massacci, K. Naliuka, P. Philippaerts et al., The S3MS .NET run time monitoring, p.9, 2009.

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer et al., Security-by-contract (sxc) for software and services of mobile systems, in: At your service: Service Engineering in the Information Society Technologies Program, 2009.

I. Aktug and K. Naliuka, Conspec: A formal language for policy specification, Proceedings of the First Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS '07), 2007.

I. Aktug and K. Naliuka, ConSpec: A formal language for policy specification, Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 07), ESORICS, 2007.

G. Costa and . Ph, D. student in Computer Science at University of Pisa and a researcher of the Information Security Group of IIT-CNR. His research interests concern the foundational and practical aspects of the security of programming languages
URL : https://hal.archives-ouvertes.fr/hal-01125587

F. Martinelli and (. M. Sc, Ph.D. 1999) is a senior researcher of IIT-CNR, 1994.