Results 81 to 90 of about 1,014 (107)
Some of the next articles are maybe not open access.

Formal Verification of a JavaCard Virtual Machine with Frama-C

2021
Formal verification of real-life industrial software remains a challenging task. It provides strong guarantees of correctness, which are particularly important for security-critical products, such as smart cards. Security of a smart card strongly relies on the requirement that the underlying JavaCard virtual machine ensures necessary isolation ...
Adel Djoudi   +2 more
openaire   +1 more source

JavaCard Program Verification

2001
This abstract provides some background information on smart cards, and explains the challenges these cards represent for formal verification of software.
openaire   +2 more sources

Proving correctness of JavaCard DL taclets using Bali

Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05), 2005
Developed at the University of Karlsruhe, KeY is an augmented commercial CASE tool with specification and deductive verification functionalities. Recently, lightweight, stand-alone tactics or "taclets" have been introduced in order to implement the JavaCard dynamic logic (JavaCard DL) sequent calculus within KeY.
openaire   +1 more source

Design of an Authentication Protocol for Gsm Javacards

2002
In this work, we present an authentication protocol derived by the integration of the Kerberos and Lamport authentication schemes. The protocol is targeted to the GSM network, involving users that interact through a mobile phone, and the network provider acting as trusted authority.
openaire   +2 more sources

Static Program Analysis of Multi-Applet JavaCard Applications

2011
Java Card provides a framework of classes and interfaces that hide the details of the underlying smart card interface and make it possible to load and run on the same card several applets, from different application providers with complex trust relationships.
Alexandros Loizidis   +2 more
openaire   +1 more source

Product Agent Concept Based on Feature Modelling and JavaCard Implementation

The International Journal of Advanced Manufacturing Technology, 2002
This paper describes research currently being carried out in the area of holonic systems. The work presented deals with the idea that process management (manufacturing, repairing, etc.) may be achieved by human operators or automated systems, but also by the product carrying and managing its own information. Each product can act as an autonomous entity
P. Charpentier, D. Jacquel, F. Chaxel
openaire   +1 more source

Die JavaCard als Programmier- und Ausführungsplattform für verteilte Anwendungen

1999
Chipkarten, die durch ihren integrierten Prozessor einfach zu nutzende Rechenkapazitat an einem beliebigen Ort bereitstellen, finden in immer mehr Bereichen Verwendung. In jungster Zeit wurden Kartenbetriebs systeme entwickelt, die Mehrfachanwendungen ermoglichen, sowie Karten, die in einer Hochsprache programmiert werden konnen und die es erlauben ...
Stefan Fünfrocken   +2 more
openaire   +1 more source

MAJA Konzept eines Multiple Application JavaCard Environment

1998
Wir stellen die Ziele des aktuellen Chipkartenprojekts an der TU Darmstadt vor. Dabei geht es um den Einsatz einer multifunktionalen Chipkarte mit der Moglichkeit, dynamisch Anwendungen durch den Benutzer zu laden und zu entladen.
openaire   +1 more source

Validation of the JavaCard Platform with Implicit Induction Techniques

2003
The bytecode verifier (BCV), which performs a static analysis to reject potentially insecure programs, is a key security function of the Java(Card) platform. Over the last few years there have been numerous projects to prove formally the correctness of bytecode verification, but relatively little effort has been made to provide methodologies ...
Gilles Barthe, Sorin Stratulat
openaire   +1 more source

Tool-Assisted Specification and Verification of the JavaCard Platform

2002
Bytecode verification is one of the key security functions of the JavaCard architecture. Its correctness is often cast relatively to a defensive virtual machine that performs checks at run-time, and an offensive one that does not, and can be summarized as stating that the two machines coincide on programs that pass bytecode verification.
Gilles Barthe   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy