AbstractJava Card is a version of Java developed to run on devices with severe storage and processing restrictions. The applets that run on these devices are frequently intended for use in critical, highly distributed, mobile conditions. They are required to be portable and safe. Often, the requirements of the application impose the use of dynamic, on-card verifications, but most of the research developed to improve the safety of Java Card applets concentrates on static verification methods. This work presents a runtime verification approach based on Design by Contract to improve the safety of Java Card applications. To this end, we propose JCML (Java Card Modelling Language) a specification language derived from JML (Java Modelling Languag...
The JavaCard transaction mechanism can ensure that a sequence of statements either is executed to co...
Abstract. We present a formally verified reference implementation of the JAVA CARD API. This case st...
Smart cards are used in security critical applications where money or private data is involved. Exam...
COSTA, Umberto Souza; MOREIRA, Anamaria Martins; MUSICANTE, Matin A.; SOUZA NETO, Plácido A. JCML: A...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
COSTA, Umberto Souza da; MOREIRA, Anamaria Martins; MUSICANTE, Martin A. Specification and Runtime V...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
Formal methods should be used to specify and verify on-card software in Java Card applications. Furt...
This thesis is concerned with formal development of Java Card applets. Java Card is a technology tha...
This thesis is concerned with different aspects of Java Card application development and use of form...
AbstractThis paper presents a case study in the formal specification and verification of a smart car...
bUniversity of Nijmegen, the Netherlands This paper presents a case study in formal specification an...
We discuss the development of an OCL specification for theJava Card API. The main purpose of this sp...
The use of smart cards to run software modules on demand has become a major business concern for ap...
International audienceThe Java Card transaction mechanism allows to protect sensitive operations on ...
The JavaCard transaction mechanism can ensure that a sequence of statements either is executed to co...
Abstract. We present a formally verified reference implementation of the JAVA CARD API. This case st...
Smart cards are used in security critical applications where money or private data is involved. Exam...
COSTA, Umberto Souza; MOREIRA, Anamaria Martins; MUSICANTE, Matin A.; SOUZA NETO, Plácido A. JCML: A...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
COSTA, Umberto Souza da; MOREIRA, Anamaria Martins; MUSICANTE, Martin A. Specification and Runtime V...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
Formal methods should be used to specify and verify on-card software in Java Card applications. Furt...
This thesis is concerned with formal development of Java Card applets. Java Card is a technology tha...
This thesis is concerned with different aspects of Java Card application development and use of form...
AbstractThis paper presents a case study in the formal specification and verification of a smart car...
bUniversity of Nijmegen, the Netherlands This paper presents a case study in formal specification an...
We discuss the development of an OCL specification for theJava Card API. The main purpose of this sp...
The use of smart cards to run software modules on demand has become a major business concern for ap...
International audienceThe Java Card transaction mechanism allows to protect sensitive operations on ...
The JavaCard transaction mechanism can ensure that a sequence of statements either is executed to co...
Abstract. We present a formally verified reference implementation of the JAVA CARD API. This case st...
Smart cards are used in security critical applications where money or private data is involved. Exam...