{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:08Z","timestamp":1725491828127},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540752264"},{"type":"electronic","value":"9783540752271"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75227-1_15","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T01:32:47Z","timestamp":1189647167000},"page":"220-234","source":"Crossref","is-referenced-by-count":3,"title":["A Formal Specification of the MIDP 2.0 Security Model"],"prefix":"10.1007","author":[{"given":"Santiago","family":"Zanella B\u00e9guelin","sequence":"first","affiliation":[]},{"given":"Gustavo","family":"Betarte","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Luna","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"JSR 37 Expert Group: Mobile Information Device Profile for Java 2 Micro Edition. Version 1.0. Sun Microsystems, Inc. (2000)"},{"key":"15_CR2","unstructured":"JSR 118 Expert Group: Mobile Information Device Profile for Java 2 Micro Edition. Version 2.0. Sun Microsystems, Inc. and Motorola, Inc. (2002)"},{"key":"15_CR3","volume-title":"MIDP 2.0 security enhancements","author":"O. Kolsi","year":"2004","unstructured":"Kolsi, O., Virtanen, T.: MIDP 2.0 security enhancements. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, Washington, DC, USA. IEEE Computer Society, Los Alamitos (2004) 90287.3"},{"key":"15_CR4","unstructured":"Debbabi, M., Saleh, M., Talhi, C., Zhioua, S.: Security analysis of wireless Java. In: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust (2005)"},{"key":"15_CR5","unstructured":"The Coq Development Team: The Coq Proof Assistant Reference Manual \u2013 Version V8.0. (2004)"},{"key":"15_CR6","volume-title":"Texts in Theoretical Computer Science","author":"Y. Bertot","year":"2004","unstructured":"Bertot, Y., Cast\u00e9ran, P.: Interactive Theorem Proving and Program Development. Coq\u2019Art: The Calculus of Inductive Constructions. In: Texts in Theoretical Computer Science, Springer, Heidelberg (2004)"},{"key":"15_CR7","unstructured":"Zanella B\u00e9guelin, S.: Especificaci\u00f3n formal del modelo de seguridad de MIDP 2.0 en el C\u00e1lculo de Construcciones Inductivas. Master\u2019s thesis, Universidad Nacional de Rosario (2006)"},{"key":"15_CR8","unstructured":"Zanella B\u00e9guelin, S., Betarte, G., Luna, C.: A formal specification of the MIDP 2.0 security model. Technical Report 06-09, Instituto de Computaci\u00f3n, Facultad de Ingenier\u00eda, Universidad de la Rep\u00fablica, Uruguay (2006)"},{"key":"15_CR9","volume-title":"International Series in Computer Science","author":"J.M. Spivey","year":"1989","unstructured":"Spivey, J.M.: The Z Notation: A Reference Manual. In: International Series in Computer Science, Prentice Hall, Hemel Hempstead, Hertfordshire, UK (1989)"},{"key":"15_CR10","volume-title":"Graduate Texts in Computer Science","author":"R.J. Back","year":"1998","unstructured":"Back, R.J., von Wright, J.: Refinement Calculus: A Systematic Introduction. In: Graduate Texts in Computer Science, Springer, Heidelberg (1998)"},{"key":"15_CR11","volume-title":"Programming from specifications","author":"C. Morgan","year":"1990","unstructured":"Morgan, C.: Programming from specifications. Prentice-Hall Inc., Upper Saddle River (1990)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_8","volume-title":"Computer Security \u2013 ESORICS 2006","author":"F. Besson","year":"2006","unstructured":"Besson, F., Dufay, G., Jensen, T.: A formal model of access control for mobile interactive devices. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, Springer, Heidelberg (2006) (to appear)"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75227-1_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:56:36Z","timestamp":1619520996000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75227-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540752264","9783540752271"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75227-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}