派博傳思國(guó)際中心

標(biāo)題: Titlebook: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices; International Worksh Gilles Barthe,Lilian Burdy,Traian Muntean [打印本頁(yè)]

作者: 空隙    時(shí)間: 2025-3-21 17:54
書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices影響因子(影響力)




書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices影響因子(影響力)學(xué)科排名




書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices被引頻次




書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices被引頻次學(xué)科排名




書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices年度引用




書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices年度引用學(xué)科排名




書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices讀者反饋




書(shū)目名稱Construction and Analysis of Safe, Secure, and Interoperable Smart Devices讀者反饋學(xué)科排名





作者: 不成比例    時(shí)間: 2025-3-21 22:33
History-Based Access Control and Secure Information Flow, control in the form of Abadi and Fournet’s history-based access control mechanism. The Java virtual machine’s permission-based stack inspection mechanism provides dynamic access control and is useful in protecting trusted callees from untrusted callers. In contrast, history-based access control pro
作者: 臭了生氣    時(shí)間: 2025-3-22 03:14

作者: conceal    時(shí)間: 2025-3-22 07:31

作者: Cirrhosis    時(shí)間: 2025-3-22 12:07
A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices,le applications on such devices. This paper presents a simple mechanism for performing such provisioning and updating, even if the applications are mutually distrustful. The mechanism extends CLDC Java.technology with a classfile attribute that carries the certificates necessary to enable the added
作者: 緯線    時(shí)間: 2025-3-22 16:51
ESC/Java2: Uniting ESC/Java and JML,e Java Modeling Language (JML). The ESC/Java2 project, whose progress is described in this paper, builds on the final release of ESC/Java from DEC/SRC in several ways. It parses all of JML, thus can be used with the growing body of JML-annotated Java code; it has additional static checking capabilit
作者: 緯線    時(shí)間: 2025-3-22 19:03
A Type System for Checking Applet Isolation in Java Card,namic checks in the Java Card Virtual Machine. This paper describes a refined type system for Java Card that enables static checking of applet isolation. With this type system, firewall violations are detected at compile time. Only a special kind of downcast requires dynamic checks.
作者: 收集    時(shí)間: 2025-3-22 23:03
Verification of Safety Properties in the Presence of Transactions,ification of . programs considerably more difficult, because they cannot be formalised in a logic based on pre- and postconditions. The KeY system includes an interactive theorem prover for . source code that models the full . standard including transactions. Based on a case study of realistic size
作者: avenge    時(shí)間: 2025-3-23 01:33

作者: 無(wú)聊點(diǎn)好    時(shí)間: 2025-3-23 08:45

作者: 粗魯性質(zhì)    時(shí)間: 2025-3-23 10:35
A Flexible Framework for the Estimation of Coverage Metrics in Explicit State Software Model Checkichecking, researchers often focus on applying model checking to software units rather than whole programs. Recently, we have introduced a framework that allows developers to specify and model check rich properties of Java software units using the Java Modeling Language (JML). An often overlooked pro
作者: Estrogen    時(shí)間: 2025-3-23 17:17
Combining Several Paradigms for Circuit Validation and Verification,he establish safety properties on it. After the first design step, we automatically translate the synthesizable VHDL into a functional form. The combination of symbolic simulation, automatic transfer function extraction, and theorem proving is used to show that the VHDL design is functionally compli
作者: superfluous    時(shí)間: 2025-3-23 19:37

作者: 情感    時(shí)間: 2025-3-23 23:48
Gilles Barthe,Lilian Burdy,Traian MunteanIncludes supplementary material:
作者: 共和國(guó)    時(shí)間: 2025-3-24 04:29
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/236067.jpg
作者: POINT    時(shí)間: 2025-3-24 09:27

作者: 使混合    時(shí)間: 2025-3-24 13:20
978-3-540-24287-1Springer-Verlag Berlin Heidelberg 2005
作者: 輕浮女    時(shí)間: 2025-3-24 15:44

作者: Solace    時(shí)間: 2025-3-24 21:58

作者: MAIZE    時(shí)間: 2025-3-25 01:54

作者: osteoclasts    時(shí)間: 2025-3-25 04:28
Untersuchung geregelter Antriebe,le applications on such devices. This paper presents a simple mechanism for performing such provisioning and updating, even if the applications are mutually distrustful. The mechanism extends CLDC Java.technology with a classfile attribute that carries the certificates necessary to enable the added security.
作者: 堅(jiān)毅    時(shí)間: 2025-3-25 11:12

作者: 不可接觸    時(shí)間: 2025-3-25 14:35

作者: 卜聞    時(shí)間: 2025-3-25 16:39

作者: 脖子    時(shí)間: 2025-3-25 20:17
A Type System for Checking Applet Isolation in Java Card,namic checks in the Java Card Virtual Machine. This paper describes a refined type system for Java Card that enables static checking of applet isolation. With this type system, firewall violations are detected at compile time. Only a special kind of downcast requires dynamic checks.
作者: 北極熊    時(shí)間: 2025-3-26 01:01

作者: notice    時(shí)間: 2025-3-26 06:21

作者: 親密    時(shí)間: 2025-3-26 10:44

作者: 畢業(yè)典禮    時(shí)間: 2025-3-26 14:22
Beispiele zur Kenntafelermittlung,lty in testing such systems. In previous work, we have introduced a new method for automated test generation from state-based formal specifications (B abstract machines, UML/OCL models, Z specifications). This method uses cause-effect analysis and boundary computation to produce test cases as sequen
作者: 豎琴    時(shí)間: 2025-3-26 17:54

作者: 借喻    時(shí)間: 2025-3-26 23:50

作者: 做方舟    時(shí)間: 2025-3-27 03:54
Zusammenfassung, Kritik und Ausblick,namic checks in the Java Card Virtual Machine. This paper describes a refined type system for Java Card that enables static checking of applet isolation. With this type system, firewall violations are detected at compile time. Only a special kind of downcast requires dynamic checks.
作者: modifier    時(shí)間: 2025-3-27 08:18
Zusammenfassung, Kritik und Ausblick,ification of . programs considerably more difficult, because they cannot be formalised in a logic based on pre- and postconditions. The KeY system includes an interactive theorem prover for . source code that models the full . standard including transactions. Based on a case study of realistic size
作者: 債務(wù)    時(shí)間: 2025-3-27 11:56

作者: 激怒某人    時(shí)間: 2025-3-27 15:12
Geschichte der Unterdruck-Flotation, environments are two among a lot of challenging issues. Next generation smart cards, so-called smart devices, are regarded as personal devices providing a secured execution and storage environment for application tasks and sensitive privacy information, respectively. Hardware evolution of smart dev
作者: 河流    時(shí)間: 2025-3-27 20:25

作者: CLAN    時(shí)間: 2025-3-27 22:07
Diskussion der Versuchsergebnisse,he establish safety properties on it. After the first design step, we automatically translate the synthesizable VHDL into a functional form. The combination of symbolic simulation, automatic transfer function extraction, and theorem proving is used to show that the VHDL design is functionally compli
作者: 小臼    時(shí)間: 2025-3-28 02:19
https://doi.org/10.1007/978-3-322-99153-9n computing devices, next generation cards will consist in embedded Java micro-server platforms. Those platforms will be able to serve various types of services and applications thanks to two important system features: adaptability and maintainability. Two features that have to be carefully taken in
作者: 心胸狹窄    時(shí)間: 2025-3-28 09:53

作者: 溫室    時(shí)間: 2025-3-28 14:15
History-Based Access Control and Secure Information Flow,ypes dependent on permission state. We also show that in contrast to stack inspection, confidential information can be leaked by the history-based access control mechanism itself. The analysis ensures a noninterference property formalizing confidentiality.
作者: 重畫(huà)只能放棄    時(shí)間: 2025-3-28 18:22
Mastering Test Generation from Smart Card Software Formal Models,wn to be cost-effective, and has the advantages that it can be tailored towards the desired test objectives. This paper focuses on showing the application of this test generation process from formal models in the context of Smart Card applications. We describe how the test generation can be controll
作者: 北極人    時(shí)間: 2025-3-28 21:43

作者: 機(jī)械    時(shí)間: 2025-3-29 01:30

作者: fatuity    時(shí)間: 2025-3-29 04:52

作者: 偏見(jiàn)    時(shí)間: 2025-3-29 10:10
Diskussion der Versuchsergebnisse,ide the design/modification of environments for model checking software units. A novel aspect of our work is the inclusion of . of JML specifications in addition to code coverage in an approach for assessing the quality of both environments and specifications. To study these ideas, we have built a f
作者: Bereavement    時(shí)間: 2025-3-29 11:46
https://doi.org/10.1007/978-3-322-99149-2static program verifier. The language includes constructs for writing specifications that capture programmer intentions about how methods and data are to be used, the compiler emits run-time checks to enforce these specifications, and the verifier can check the consistency between a program and its specifications.
作者: instructive    時(shí)間: 2025-3-29 18:47

作者: Fallibility    時(shí)間: 2025-3-29 22:25
Diskussion der Versuchsergebnisse,nation of symbolic simulation, automatic transfer function extraction, and theorem proving is used to show that the VHDL design is functionally compliant to the specification. The approach is demonstrated on a SHA-1 cryptographic circuit.
作者: 木質(zhì)    時(shí)間: 2025-3-30 01:28

作者: 盡責(zé)    時(shí)間: 2025-3-30 05:44

作者: Calibrate    時(shí)間: 2025-3-30 08:58

作者: 辮子帶來(lái)幫助    時(shí)間: 2025-3-30 14:48

作者: 向宇宙    時(shí)間: 2025-3-30 20:28
Smart Devices for Next Generation Mobile Services,vice provisioning by applying mobile agents to smart devices. We further discuss how the middleware platform can be integrated with a security framework for a federation of mobile agents, where a smart device is used as a central trusted entity.
作者: 稱贊    時(shí)間: 2025-3-30 23:14
The Spec# Programming System: An Overview,static program verifier. The language includes constructs for writing specifications that capture programmer intentions about how methods and data are to be used, the compiler emits run-time checks to enforce these specifications, and the verifier can check the consistency between a program and its specifications.
作者: 火海    時(shí)間: 2025-3-31 01:31





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
图们市| 鹤庆县| 临泽县| 呼图壁县| 伽师县| 香格里拉县| 九台市| 奈曼旗| 香河县| 雅安市| 凌源市| 潞西市| 德清县| 米林县| 邮箱| 沭阳县| 泸水县| 东辽县| 商丘市| 咸丰县| 巢湖市| 华亭县| 昌都县| 安康市| 和政县| 克拉玛依市| 金堂县| 十堰市| 宁远县| 垫江县| 黔西县| 盘锦市| 嵊州市| 广西| 随州市| 邓州市| 平阴县| 平山县| 固镇县| 扎赉特旗| 平谷区|