{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T10:02:55Z","timestamp":1747476175022},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642125096"},{"type":"electronic","value":"9783642125102"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12510-2_9","type":"book-chapter","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T23:43:16Z","timestamp":1270856596000},"page":"118-132","source":"Crossref","is-referenced-by-count":7,"title":["Firewall Mechanism in a User Centric Smart Card Ownership Model"],"prefix":"10.1007","author":[{"given":"Raja Naeem","family":"Akram","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Deville, D., Galland, A., Grimaud, G., Jean, S.: Smart card operating systems: Past, present and future. In: Proceedings of the 5 th NORDU\/USENIX Conference (2003)"},{"issue":"2","key":"9_CR2","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.istr.2009.06.007","volume":"14","author":"D. Sauveron","year":"2009","unstructured":"Sauveron, D.: Multiapplication Smart Card: Towards an Open Smart Card? Inf. Secur. Tech. Rep.\u00a014(2), 70\u201378 (2009)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"9_CR3","unstructured":"Chaumette, S., Sauveron, D.: New Security Problems Raised by Open Multiapplication Smart Cards. LaBRI, Universit\u00e9 Bordeaux 1 (2004), RR-1332\u201304"},{"key":"9_CR4","volume-title":"Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide","author":"Z. Chen","year":"2000","unstructured":"Chen, Z.: Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide. Addison-Wesley Longman Publishing Co., Inc., Boston (2000)"},{"key":"9_CR5","first-page":"14","volume-title":"WOST 1999: Proceedings of the USENIX Workshop on Smartcard Technology","author":"M. Montgomery","year":"1999","unstructured":"Montgomery, M., Krishna, K.: Secure Object Sharing in Java Card. In: WOST 1999: Proceedings of the USENIX Workshop on Smartcard Technology, p. 14. USENIX Association, Berkeley (1999)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/3-540-45418-7_9","volume-title":"Smart Card Programming and Security","author":"M. \u00c9luard","year":"2001","unstructured":"\u00c9luard, M., Jensen, T.P., Denney, E.: An Operational Semantics of the Java Card Firewall. In: Attali, S., Jensen, T. (eds.) E-SMART 2001. LNCS, vol.\u00a02140, pp. 95\u2013110. Springer, Heidelberg (2001)"},{"key":"9_CR7","unstructured":"Bernardeschi, C., Martini, L.: Enforcement of Applet Boundaries in Java Card Systems. In: IASTED Conf. on Software Engineering and Applications, pp. 96\u2013101 (2004)"},{"key":"9_CR8","unstructured":"Java Card Platform Specification; Application Programming Interface, Runtime Environment Specification, Virtual Machine Specification. Sun Microsystem Inc Std. Version 2.2.2 (March 2006), \n                    \n                      http:\/\/java.sun.com\/javacard\/specs.html"},{"key":"9_CR9","unstructured":"Multos: The Multos Specification, Online, Std., \n                    \n                      http:\/\/www.multos.com\/"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/978-3-540-24721-0_6","volume-title":"Fundamental Approaches to Software Engineering","author":"M. Huisman","year":"2004","unstructured":"Huisman, M., Gurov, D., Sprenger, C., Chugunov, G.: Checking Absence of Illicit Applet Interactions: A Case Study. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol.\u00a02984, pp. 84\u201398. Springer, Heidelberg (2004)"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","volume-title":"Smart Card Research and Advanced Applications","author":"W. Mostowski","year":"2008","unstructured":"Mostowski, W., Poll, E.: Malicious Code on Java Card Smartcards: Attacks and Countermeasures. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 1\u201316. Springer, Heidelberg (2008)"},{"key":"9_CR12","first-page":"11","volume-title":"CARDIS 2002: Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference","author":"M. \u00c9luard","year":"2002","unstructured":"\u00c9luard, M., Jensen, T.: Secure Object Flow Analysis for Java Card. In: CARDIS 2002: Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference, p. 11. USENIX Association, Berkeley (2002)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-45165-X_3","volume-title":"Java on Smart Cards: Programming and Security","author":"P. Bieber","year":"2001","unstructured":"Bieber, P., Cazin, J., Marouani, A.E., Girard, P., Lanet, J.L., Wiels, V., Zanon, G.: The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow. In: Attali, I., Jensen, T. (eds.) JavaCard 2000. LNCS, vol.\u00a02041, pp. 25\u201337. Springer, Heidelberg (2001)"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/978-3-642-10838-9_3","volume-title":"WISA 2009","author":"R.N. Akram","year":"2009","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: Application Management Framework in User Centric Smart Card Ownership Model. In: Youm, H.Y., Jang, J. (eds.) WISA 2009. LNCS, vol.\u00a05932, pp. 20\u201335. Springer, Heidelberg (2009)"},{"key":"9_CR15","first-page":"3","volume-title":"WOST 1999: Proceedings of the USENIX Workshop on Smartcard Technology","author":"P. Girard","year":"1999","unstructured":"Girard, P.: Which Security Policy for Multiplication Smart Cards? In: WOST 1999: Proceedings of the USENIX Workshop on Smartcard Technology, p. 3. USENIX Association, Berkeley (1999)"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/3-540-48683-6_43","volume-title":"Computer Aided Verification","author":"D.A. Basin","year":"1999","unstructured":"Basin, D.A., Friedrich, S., Posegga, J., Vogt, H.: Java Bytecode Verification by Model Checking. In: Halbwachs, N., Peled, D.A. (eds.) CAV 1999. LNCS, vol.\u00a01633, pp. 491\u2013494. Springer, Heidelberg (1999)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-45685-6_5","volume-title":"Theorem Proving in Higher Order Logics","author":"D.A. Basin","year":"2002","unstructured":"Basin, D.A., Friedrich, S., Gawkowski, M.: Verified Bytecode Model Checkers. In: Carre\u00f1o, V.A., Mu\u00f1oz, C.A., Tahar, S. (eds.) TPHOLs 2002. LNCS, vol.\u00a02410, pp. 47\u201366. Springer, Heidelberg (2002)"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/349299.349315","volume-title":"PLDI 2000: Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation","author":"C. Colby","year":"2000","unstructured":"Colby, C., Lee, P., Necula, G.C., Blau, F., Plesko, M., Cline, K.: A Certifying Compiler for Java. In: PLDI 2000: Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation, pp. 95\u2013107. ACM, New York (2000)"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/3-540-47813-2_3","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"G. Barthe","year":"2002","unstructured":"Barthe, G., Dufay, G., Jakubiec, L., Melo de Sousa, S.: A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines. In: Cortesi, A. (ed.) VMCAI 2002. LNCS, vol.\u00a02294, pp. 32\u201345. Springer, Heidelberg (2002)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BFb0055755","volume-title":"Mathematical Foundations of Computer Science 1998","author":"E. B\u00f6rger","year":"1998","unstructured":"B\u00f6rger, E., Schulte, W.: Defining the Java Virtual Machine as Platform for Provably Correct Java Compilation. In: Brim, L., Gruska, J., Zlatu\u0161ka, J. (eds.) MFCS 1998. LNCS, vol.\u00a01450, pp. 17\u201335. Springer, Heidelberg (1998)"},{"key":"9_CR21","volume-title":"Applied cryptography : protocols, algorithms, and source code in C","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. John Wiley & Sons, Inc., New York (1995)","edition":"2"},{"key":"9_CR22","first-page":"2","volume-title":"WIESS 2002: Proceedings of the 2nd conference on Industrial Experiences with Systems Software","author":"D. Deville","year":"2002","unstructured":"Deville, D., Grimaud, G.: Building an \u201cimpossible\u201d verifier on a java card. In: WIESS 2002: Proceedings of the 2nd conference on Industrial Experiences with Systems Software, p. 2. USENIX Association, Berkeley (2002)"},{"volume-title":"Smart Cards, Tokens, Security and Applications","year":"2008","key":"9_CR23","unstructured":"Mayes, K., Markantonakis, K. (eds.): Smart Cards, Tokens, Security and Applications. Springer, Heidelberg (2008)"},{"key":"9_CR24","first-page":"79","volume-title":"CMS 2004 - Eight IFIP TC-6-11 Conference on Communications and Multimedia Security","author":"K. Markantonakis","year":"2004","unstructured":"Markantonakis, K., Mayes, K.: A Secure Channel protocol for multi-application smart cards based on public key cryptography. In: Chadwick, D., Prennel, B. (eds.) CMS 2004 - Eight IFIP TC-6-11 Conference on Communications and Multimedia Security, pp. 79\u201396. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12510-2_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:42:16Z","timestamp":1619782936000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12510-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642125096","9783642125102"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12510-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}