{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:30:41Z","timestamp":1761597041595},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540734079"},{"type":"electronic","value":"9783540734086"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73408-6_21","type":"book-chapter","created":{"date-parts":[[2007,8,13]],"date-time":"2007-08-13T09:23:01Z","timestamp":1186996981000},"page":"297-312","source":"Crossref","is-referenced-by-count":28,"title":["Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code"],"prefix":"10.1007","author":[{"given":"N.","family":"Dragoni","sequence":"first","affiliation":[]},{"given":"F.","family":"Massacci","sequence":"additional","affiliation":[]},{"given":"K.","family":"Naliuka","sequence":"additional","affiliation":[]},{"given":"I.","family":"Siahaan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Building bug-free O-O software: An introduction to Design by Contract(TM). Availabe at http:\/\/archive.eiffel.com\/doc\/manuals\/technology\/contract\/"},{"key":"21_CR2","volume-title":"Model Checking","author":"E.M. Clarke","year":"2000","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (2000)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","first-page":"329","volume-title":"Computer Aided Verification","author":"D.L. Dill","year":"1992","unstructured":"Dill, D.L., Hu, A.J., Wong-Toi, H.: Checking for Language Inclusion Using Simulation Relations. In: Larsen, K.G., Skou, A. (eds.) CAV 1991. LNCS, vol.\u00a0575, pp. 329\u2013341. Springer, Heidelberg (1992)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/3-540-45694-5_10","volume-title":"CONCUR 2002 - Concurrency Theory","author":"K. Etessami","year":"2002","unstructured":"Etessami, K.: A hierarchy of polynomial-time computable simulations for automata. In: Brim, L., Jan\u010dar, P., K\u0159et\u00ednsk\u00fd, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol.\u00a02421, pp. 131\u2013144. Springer, Heidelberg (2002)"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1007\/3-540-48224-5_57","volume-title":"Automata, Languages and Programming","author":"K. Etessami","year":"2001","unstructured":"Etessami, K., Wilke, T., Schuller, R.: Fair Simulation Relations, Parity Games, and State Space Reduction for Buchi Automata. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.\u00a02076, pp. 694\u2013707. Springer, Heidelberg (2001)"},{"issue":"3","key":"21_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/40.591650","volume":"17","author":"L. Gong","year":"1997","unstructured":"Gong, L.: Java Security: Present and Near Future. IEEE Micro\u00a017(3), 14\u201319 (1997)","journal-title":"IEEE Micro"},{"key":"21_CR7","unstructured":"Gong, L., Ellison, G.: Inside Java(TM) 2 Platform Security: Architecture, API Design, and Implementation. Pearson Education (2003)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Havelund, K., Rosu, G.: Efficient monitoring of safety properties. Software Tools for Tech. Transfer (2004)","DOI":"10.1007\/s10009-003-0117-6"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/3-540-63141-0_19","volume-title":"CONCUR\u201997: Concurrency Theory","author":"T. Henzinger","year":"1997","unstructured":"Henzinger, T., Kupferman, O., Rajamani, S.: Fair Simulation. In: Mazurkiewicz, A., Winkowski, J. (eds.) CONCUR 1997. LNCS, vol.\u00a01243, pp. 273\u2013287. Springer, Heidelberg (1997)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-46541-3_24","volume-title":"STACS 2000","author":"M. Jurdzinski","year":"2000","unstructured":"Jurdzinski, M.: Small Progress Measures for Solving Parity Games. In: Reichel, H., Tison, S. (eds.) STACS 2000. LNCS, vol.\u00a01770, pp. 290\u2013301. Springer, Heidelberg (2000)"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/3-540-56922-7_9","volume-title":"Computer Aided Verification","author":"Y. Kesten","year":"1993","unstructured":"Kesten, Y., Manna, Z., McGuire, H., Pnueli, A.: A decision algorithm for full propositional temporal logic. In: Courcoubetis, C. (ed.) CAV 1993. LNCS, vol.\u00a0697, pp. 97\u2013109. Springer, Heidelberg (1993)"},{"issue":"7","key":"21_CR12","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/2.869389","volume":"33","author":"J.R. Michener","year":"2000","unstructured":"Michener, J.R., Acar, T.: Managing System and Active-Content Integrity. IEEE Computer\u00a033(7), 108\u2013110 (2000)","journal-title":"IEEE Computer"},{"key":"21_CR13","unstructured":"Moses, T.: eXtensible Access Control Markup Language (XACML) version 1.0. Technical report, OASIS (2003)"},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/263699.263712","volume-title":"POPL 1997: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"G.C. Necula","year":"1997","unstructured":"Necula, G.C.: Proof-Carrying Code. In: POPL 1997: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, New York, NY, USA, 1997, pp. 106\u2013119. ACM Press, New York (1997)"},{"issue":"4","key":"21_CR15","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/989393.989454","volume":"39","author":"G.C. Necula","year":"2004","unstructured":"Necula, G.C., Lee, P.: The Design and Implementation of a Certifying Compiler. SIGPLAN Not.\u00a039(4), 612\u2013625 (2004)","journal-title":"SIGPLAN Not."},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/508171.508175","volume-title":"NSPW 2001: Proceedings of the 2001 Workshop on New security paradigms","author":"R. Sekar","year":"2001","unstructured":"Sekar, R., Ramakrishnan, C.R., Ramakrishnan, I.V., Smolka, S.A.: Model-Carrying Code (MCC): a New Paradigm for Mobile-Code Security. In: NSPW 2001: Proceedings of the 2001 Workshop on New security paradigms, New York, NY, USA, 2001, pp. 23\u201330. ACM Press, New York (2001)"},{"issue":"5","key":"21_CR17","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1165389.945448","volume":"37","author":"R. Sekar","year":"2003","unstructured":"Sekar, R., Venkatakrishnan, V.N., Basu, S., Bhatkar, S., DuVarney, D.C.: Model-Carrying Code: a Practical Approach for Safe Execution of Untrusted Applications. ACM SIGOPS Operating Systems Review\u00a037(5), 15\u201328 (2003)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-24848-4_9","volume-title":"Component Deployment","author":"N. Sommer Le","year":"2004","unstructured":"Le Sommer, N.: Towards Dynamic Resource Contractualisation for Software Components. In: Emmerich, W., Wolf, A.L. (eds.) CD 2004. LNCS, vol.\u00a03083, pp. 129\u2013143. Springer, Heidelberg (2004)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Wallach, D.S., Felten, E.W.: Understanding Java Stack Inspection. In: IEEE Symposium on Security and Privacy (1998)","DOI":"10.1109\/SECPRI.1998.674823"},{"key":"21_CR20","unstructured":"Zobel, A., Simoni, C., Piazza, D., Nuez, X., Rodriguez, D.: Business case and security requirements. Public Deliverable D5.1.1, EU Project S3MS (October 2006), Report available at http:\/\/www.s3ms.org"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructure"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73408-6_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:10:40Z","timestamp":1619503840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73408-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540734079","9783540734086"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73408-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}