2001
DOI: 10.1007/3-540-45418-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Jakarta: A Toolset for Reasoning about JavaCard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
14
0

Year Published

2002
2002
2014
2014

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 21 publications
1
14
0
Order By: Relevance
“…In addition, we have illustrated the usefulness of our package in reasoning about the JavaCard platform. This positive experience supports the claim laid in [2] that proofs of correctness of the JavaCard platform can be automated to a large extent and indicates that proof assistants could provide a viable approach to validate novel type systems for future versions of Javacard.…”
Section: Resultssupporting
confidence: 69%
See 1 more Smart Citation
“…In addition, we have illustrated the usefulness of our package in reasoning about the JavaCard platform. This positive experience supports the claim laid in [2] that proofs of correctness of the JavaCard platform can be automated to a large extent and indicates that proof assistants could provide a viable approach to validate novel type systems for future versions of Javacard.…”
Section: Resultssupporting
confidence: 69%
“…We would like to introduce functions using the format of conditional rewriting rules of [2]. Indeed, this format, which can be automatically translated into Coq (provided the guard conditions are satisfied), lead to more readable specifications, especially for partial functions.…”
Section: Extensionsmentioning
confidence: 99%
“…Term rewriting has been used to model a variety of problems in security, from the analysis of security protocols (see, for example, [12,37,60]) to the definition of policies for controlling information leakage [36]. On access control specifically, Koch et al [48] use graph transformation rules to formalise RBAC, and more recently, [10,59,21] use term rewrite rules to model particular access control models and to express access control policies.…”
Section: Related Workmentioning
confidence: 99%
“…The first attempts to develop formal theories to define and validate security policies (see, for instance, [16]) have used first-order theorem provers, purpose-built logics, or flow-analysis, but these approaches have limitations (as discussed for instance in [24]). More recently, rewriting techniques have been fruitfully exploited in the context of security protocols (see [6,22,2]), security policies controlling information leakage (see [21]), and access control policies (see [35,12]). Along these lines, rewriting systems appear to be well adapted for providing a semantics for distributed access control mechanisms.…”
Section: Introductionmentioning
confidence: 99%