2002
DOI: 10.1007/3-540-45614-7_16
|View full text |Cite
|
Sign up to set email alerts
|

Formal Specification and Static Checking of Gemplus’ Electronic Purse Using ESC/Java

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2002
2002
2019
2019

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(26 citation statements)
references
References 4 publications
0
26
0
Order By: Relevance
“…Other works that apply a DBC approach based on JML in the security context are presented by Lloyd et al (biometric authentication system) [30], Cataño et al [31] (smart card system), and Mustafa et al [32] (Android system services). These works, however, do not cover applications consisting of heterogeneous modules and do not use the combination of dynamic and static analysis technique for assertionbased verification.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Other works that apply a DBC approach based on JML in the security context are presented by Lloyd et al (biometric authentication system) [30], Cataño et al [31] (smart card system), and Mustafa et al [32] (Android system services). These works, however, do not cover applications consisting of heterogeneous modules and do not use the combination of dynamic and static analysis technique for assertionbased verification.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Most of the specifications are written by the second author, who beforehand did not have any experience with Plural or the Plural language, or with writing formal specifications in general. The first author, who had experience in writing formal specifications with JML [14,15], but not with Plural, supervised the work and made suggestions to improve the specifications. The third author, the principal designer of Plural, provided feed-back on writing Plural specifications.…”
Section: Evaluation Of the Case Studymentioning
confidence: 99%
“…Other works that employ JML in the application security context are presented by Lloyd et al (a biometric authentication system) [28] and by Cataño et al (an electronic purse implemented as a Java Card application) [3]. Both works use JML in conjunction with the static checker ESC/Java for an already implemented application, facing several problems concerning the limitations of extended static checking, specifically, too large verification conditions.…”
Section: Related Workmentioning
confidence: 99%