標(biāo)題: Titlebook: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices; International Worksh Gilles Barthe,Lilian Burdy,Traian Muntean [打印本頁(yè)] 作者: 空隙 時(shí)間: 2025-3-21 17:54
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices影響因子(影響力)
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices影響因子(影響力)學(xué)科排名
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices被引頻次
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices被引頻次學(xué)科排名
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices年度引用
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices年度引用學(xué)科排名
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices讀者反饋
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices讀者反饋學(xué)科排名
作者: 不成比例 時(shí)間: 2025-3-21 22:33
History-Based Access Control and Secure Information Flow, control in the form of Abadi and Fournet’s history-based access control mechanism. The Java virtual machine’s permission-based stack inspection mechanism provides dynamic access control and is useful in protecting trusted callees from untrusted callers. In contrast, history-based access control pro作者: 臭了生氣 時(shí)間: 2025-3-22 03:14 作者: conceal 時(shí)間: 2025-3-22 07:31 作者: Cirrhosis 時(shí)間: 2025-3-22 12:07
A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices,le applications on such devices. This paper presents a simple mechanism for performing such provisioning and updating, even if the applications are mutually distrustful. The mechanism extends CLDC Java.technology with a classfile attribute that carries the certificates necessary to enable the added 作者: 緯線 時(shí)間: 2025-3-22 16:51
ESC/Java2: Uniting ESC/Java and JML,e Java Modeling Language (JML). The ESC/Java2 project, whose progress is described in this paper, builds on the final release of ESC/Java from DEC/SRC in several ways. It parses all of JML, thus can be used with the growing body of JML-annotated Java code; it has additional static checking capabilit作者: 緯線 時(shí)間: 2025-3-22 19:03
A Type System for Checking Applet Isolation in Java Card,namic checks in the Java Card Virtual Machine. This paper describes a refined type system for Java Card that enables static checking of applet isolation. With this type system, firewall violations are detected at compile time. Only a special kind of downcast requires dynamic checks.作者: 收集 時(shí)間: 2025-3-22 23:03
Verification of Safety Properties in the Presence of Transactions,ification of . programs considerably more difficult, because they cannot be formalised in a logic based on pre- and postconditions. The KeY system includes an interactive theorem prover for . source code that models the full . standard including transactions. Based on a case study of realistic size 作者: avenge 時(shí)間: 2025-3-23 01:33 作者: 無(wú)聊點(diǎn)好 時(shí)間: 2025-3-23 08:45 作者: 粗魯性質(zhì) 時(shí)間: 2025-3-23 10:35
A Flexible Framework for the Estimation of Coverage Metrics in Explicit State Software Model Checkichecking, researchers often focus on applying model checking to software units rather than whole programs. Recently, we have introduced a framework that allows developers to specify and model check rich properties of Java software units using the Java Modeling Language (JML). An often overlooked pro作者: Estrogen 時(shí)間: 2025-3-23 17:17
Combining Several Paradigms for Circuit Validation and Verification,he establish safety properties on it. After the first design step, we automatically translate the synthesizable VHDL into a functional form. The combination of symbolic simulation, automatic transfer function extraction, and theorem proving is used to show that the VHDL design is functionally compli作者: superfluous 時(shí)間: 2025-3-23 19:37 作者: 情感 時(shí)間: 2025-3-23 23:48
Gilles Barthe,Lilian Burdy,Traian MunteanIncludes supplementary material: 作者: 共和國(guó) 時(shí)間: 2025-3-24 04:29
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/236067.jpg作者: POINT 時(shí)間: 2025-3-24 09:27 作者: 使混合 時(shí)間: 2025-3-24 13:20
978-3-540-24287-1Springer-Verlag Berlin Heidelberg 2005作者: 輕浮女 時(shí)間: 2025-3-24 15:44 作者: Solace 時(shí)間: 2025-3-24 21:58 作者: MAIZE 時(shí)間: 2025-3-25 01:54 作者: osteoclasts 時(shí)間: 2025-3-25 04:28
Untersuchung geregelter Antriebe,le applications on such devices. This paper presents a simple mechanism for performing such provisioning and updating, even if the applications are mutually distrustful. The mechanism extends CLDC Java.technology with a classfile attribute that carries the certificates necessary to enable the added security.作者: 堅(jiān)毅 時(shí)間: 2025-3-25 11:12 作者: 不可接觸 時(shí)間: 2025-3-25 14:35 作者: 卜聞 時(shí)間: 2025-3-25 16:39 作者: 脖子 時(shí)間: 2025-3-25 20:17
A Type System for Checking Applet Isolation in Java Card,namic checks in the Java Card Virtual Machine. This paper describes a refined type system for Java Card that enables static checking of applet isolation. With this type system, firewall violations are detected at compile time. Only a special kind of downcast requires dynamic checks.作者: 北極熊 時(shí)間: 2025-3-26 01:01 作者: notice 時(shí)間: 2025-3-26 06:21 作者: 親密 時(shí)間: 2025-3-26 10:44 作者: 畢業(yè)典禮 時(shí)間: 2025-3-26 14:22
Beispiele zur Kenntafelermittlung,lty in testing such systems. In previous work, we have introduced a new method for automated test generation from state-based formal specifications (B abstract machines, UML/OCL models, Z specifications). This method uses cause-effect analysis and boundary computation to produce test cases as sequen作者: 豎琴 時(shí)間: 2025-3-26 17:54 作者: 借喻 時(shí)間: 2025-3-26 23:50 作者: 做方舟 時(shí)間: 2025-3-27 03:54
Zusammenfassung, Kritik und Ausblick,namic checks in the Java Card Virtual Machine. This paper describes a refined type system for Java Card that enables static checking of applet isolation. With this type system, firewall violations are detected at compile time. Only a special kind of downcast requires dynamic checks.作者: modifier 時(shí)間: 2025-3-27 08:18
Zusammenfassung, Kritik und Ausblick,ification of . programs considerably more difficult, because they cannot be formalised in a logic based on pre- and postconditions. The KeY system includes an interactive theorem prover for . source code that models the full . standard including transactions. Based on a case study of realistic size 作者: 債務(wù) 時(shí)間: 2025-3-27 11:56 作者: 激怒某人 時(shí)間: 2025-3-27 15:12
Geschichte der Unterdruck-Flotation, environments are two among a lot of challenging issues. Next generation smart cards, so-called smart devices, are regarded as personal devices providing a secured execution and storage environment for application tasks and sensitive privacy information, respectively. Hardware evolution of smart dev作者: 河流 時(shí)間: 2025-3-27 20:25 作者: CLAN 時(shí)間: 2025-3-27 22:07
Diskussion der Versuchsergebnisse,he establish safety properties on it. After the first design step, we automatically translate the synthesizable VHDL into a functional form. The combination of symbolic simulation, automatic transfer function extraction, and theorem proving is used to show that the VHDL design is functionally compli作者: 小臼 時(shí)間: 2025-3-28 02:19
https://doi.org/10.1007/978-3-322-99153-9n computing devices, next generation cards will consist in embedded Java micro-server platforms. Those platforms will be able to serve various types of services and applications thanks to two important system features: adaptability and maintainability. Two features that have to be carefully taken in作者: 心胸狹窄 時(shí)間: 2025-3-28 09:53 作者: 溫室 時(shí)間: 2025-3-28 14:15
History-Based Access Control and Secure Information Flow,ypes dependent on permission state. We also show that in contrast to stack inspection, confidential information can be leaked by the history-based access control mechanism itself. The analysis ensures a noninterference property formalizing confidentiality.作者: 重畫(huà)只能放棄 時(shí)間: 2025-3-28 18:22
Mastering Test Generation from Smart Card Software Formal Models,wn to be cost-effective, and has the advantages that it can be tailored towards the desired test objectives. This paper focuses on showing the application of this test generation process from formal models in the context of Smart Card applications. We describe how the test generation can be controll作者: 北極人 時(shí)間: 2025-3-28 21:43 作者: 機(jī)械 時(shí)間: 2025-3-29 01:30 作者: fatuity 時(shí)間: 2025-3-29 04:52 作者: 偏見(jiàn) 時(shí)間: 2025-3-29 10:10
Diskussion der Versuchsergebnisse,ide the design/modification of environments for model checking software units. A novel aspect of our work is the inclusion of . of JML specifications in addition to code coverage in an approach for assessing the quality of both environments and specifications. To study these ideas, we have built a f作者: Bereavement 時(shí)間: 2025-3-29 11:46
https://doi.org/10.1007/978-3-322-99149-2static program verifier. The language includes constructs for writing specifications that capture programmer intentions about how methods and data are to be used, the compiler emits run-time checks to enforce these specifications, and the verifier can check the consistency between a program and its specifications.作者: instructive 時(shí)間: 2025-3-29 18:47 作者: Fallibility 時(shí)間: 2025-3-29 22:25
Diskussion der Versuchsergebnisse,nation of symbolic simulation, automatic transfer function extraction, and theorem proving is used to show that the VHDL design is functionally compliant to the specification. The approach is demonstrated on a SHA-1 cryptographic circuit.作者: 木質(zhì) 時(shí)間: 2025-3-30 01:28 作者: 盡責(zé) 時(shí)間: 2025-3-30 05:44 作者: Calibrate 時(shí)間: 2025-3-30 08:58 作者: 辮子帶來(lái)幫助 時(shí)間: 2025-3-30 14:48 作者: 向宇宙 時(shí)間: 2025-3-30 20:28
Smart Devices for Next Generation Mobile Services,vice provisioning by applying mobile agents to smart devices. We further discuss how the middleware platform can be integrated with a security framework for a federation of mobile agents, where a smart device is used as a central trusted entity.作者: 稱贊 時(shí)間: 2025-3-30 23:14
The Spec# Programming System: An Overview,static program verifier. The language includes constructs for writing specifications that capture programmer intentions about how methods and data are to be used, the compiler emits run-time checks to enforce these specifications, and the verifier can check the consistency between a program and its specifications.作者: 火海 時(shí)間: 2025-3-31 01:31