{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:50:32Z","timestamp":1725745832502},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642406140"},{"type":"electronic","value":"9783642406157"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40615-7_7","type":"book-chapter","created":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T01:08:02Z","timestamp":1377133682000},"page":"197-215","source":"Crossref","is-referenced-by-count":2,"title":["Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract"],"prefix":"10.1007","author":[{"given":"Olga","family":"Gadyatskaya","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Aljuraidan, J., Fragkaki, E., Bauer, L., Jia, L., Fukushima, K., Kiyomoto, S., Miyake, Y.: Run-time enforcement of information-flow properties on Android. Technical Report CMU-CyLab-12-015, Carnegie Mellon University, \n                  \n                    http:\/\/repository.cmu.edu\/cgi\/viewcontent.cgi?article=1110&context=cylab\n                  \n                  \n                 (accessed on the web in December 2012)"},{"issue":"11","key":"7_CR2","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.1016\/j.jss.2012.05.061","volume":"85","author":"M. Avvenuti","year":"2012","unstructured":"Avvenuti, M., Bernardeschi, C., De Francesco, N., Masci, P.: JCSI: A tool for checking secure information flow in Java Card applications. J. of Systems and Software\u00a085(11), 2479\u20132493 (2012)","journal-title":"J. of Systems and Software"},{"issue":"4","key":"7_CR3","first-page":"369","volume":"10","author":"P. Bieber","year":"2002","unstructured":"Bieber, P., Cazin, J., Wiels, V., Zanon, G., Girard, P., Lanet, J.-L.: Checking secure interactions of smart card applets: Extended version. J. of Comp. Sec.\u00a010(4), 369\u2013398 (2002)","journal-title":"J. of Comp. Sec."},{"key":"7_CR4","unstructured":"Dragoni, N., Lostal, E., Gadyatskaya, O., Massacci, F., Paci, F.: A load time Policy Checker for open multi-application smart cards, pp. 153\u2013156. IEEE Press"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-642-19125-1_4","volume-title":"Engineering Secure Software and Systems","author":"A. Fontaine","year":"2011","unstructured":"Fontaine, A., Hym, S., Simplot-Ryl, I.: On-device control flow verification for Java programs. In: Erlingsson, \u00da., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol.\u00a06542, pp. 43\u201357. Springer, Heidelberg (2011)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-25560-1_17","volume-title":"Information Systems Security","author":"O. Gadyatskaya","year":"2011","unstructured":"Gadyatskaya, O., Lostal, E., Massacci, F.: Load time security verification. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. LNCS, vol.\u00a07093, pp. 250\u2013264. Springer, Heidelberg (2011)"},{"key":"7_CR7","unstructured":"Gadyatskaya, O., Massacci, F., Nguyen, Q.-H., Chetali, B.: Load time code validation for mobile phone Java Cards. Technical Report DISI-12-025, University of Trento (2012)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-642-27937-9_13","volume-title":"Information Security Technology for Applications","author":"O. Gadyatskaya","year":"2012","unstructured":"Gadyatskaya, O., Massacci, F., Paci, F., Stankevich, S.: Java Card architecture for autonomous yet secure evolution of smart cards applications. In: Aura, T., J\u00e4rvinen, K., Nyberg, K. (eds.) NordSec 2010. LNCS, vol.\u00a07127, pp. 187\u2013192. Springer, Heidelberg (2012)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-85893-5_3","volume-title":"Smart Card Research and Advanced Applications","author":"D. Ghindici","year":"2008","unstructured":"Ghindici, D., Simplot-Ryl, I.: On practical information flow policies for Java-enabled multiapplication smart cards. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 32\u201347. Springer, Heidelberg (2008)"},{"key":"7_CR10","unstructured":"Girard, P.: Which security policy for multiapplication smart cards? In: Proc. of USENIX Workshop on Smartcard Technology. USENIX Association (1999)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-24721-0_6","volume-title":"Fundamental Approaches to Software Engineering","author":"M. Huisman","year":"2004","unstructured":"Huisman, M., Gurov, D., Sprenger, C., Chugunov, G.: Checking absence of illicit applet interactions: A\u00a0case\u00a0study. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol.\u00a02984, pp. 84\u201398. Springer, Heidelberg (2004)"},{"key":"7_CR12","unstructured":"Project Hydra. Project Hydra - Smart care for smart meters. Final report (October 2012), \n                  \n                    http:\/\/projecthydra.info\/wp-content\/uploads\/2012\/10\/Hydra_Final_Report.pdf\n                  \n                  \n                 (accessed on the web in December 2012)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-642-33167-1_20","volume-title":"Computer Security \u2013 ESORICS 2012","author":"J. Koo","year":"2012","unstructured":"Koo, J., Lin, X., Bagchi, S.: PRIVATUS: Wallet-friendly privacy protection for smart meters. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 343\u2013360. Springer, Heidelberg (2012)"},{"key":"7_CR14","unstructured":"Langer, J., Oyrer, A.: Secure element development. In: NFC Forum Spotlight for Developers, \n                  \n                    http:\/\/www.nfc-forum.org\/events\/oulu_spotlight\/2009_09_01_Secure_Element_Programming.pdf\n                  \n                  \n                 (accessed on the web in December 2012)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proc. of the ACM WPES 2011, pp. 49\u201360. ACM (2011)","DOI":"10.1145\/2046556.2046564"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/10722599_2","volume-title":"Computer Security - ESORICS 2000","author":"G. Schellhorn","year":"2000","unstructured":"Schellhorn, G., Reif, W., Schairer, A., Karger, P., Austel, V., Toll, D.: Verification of a formal security model for multiapplicative smart cards. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 17\u201336. Springer, Heidelberg (2000)"},{"key":"7_CR17","unstructured":"Sullivan, B.: What will talking power meters say about you? \n                  \n                    http:\/\/redtape.nbcnews.com\/_news\/2009\/10\/09\/6345711-what-will-talking-power-meters-say-about-you\n                  \n                  \n                 (accessed on the web in December 2012)"},{"key":"7_CR18","unstructured":"Sun. Runtime environment and virtual machine specifications. Java CardTM platform, v.2.2.2. Specification (2006)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Sundaresan, V., Hendren, L., Razafimahefa, C., Vallee-Rai, R., Lam, P., Gagnon, E., Godin, C.: Practical virtual method call resolution for Java. In: Proc. of OOPSLA 2000, pp. 264\u2013280. ACM Press (2000)","DOI":"10.1145\/354222.353189"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Components and Objects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40615-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T19:27:44Z","timestamp":1558034864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40615-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642406140","9783642406157"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40615-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}