Certification of smart-card applications in common criteria: Proving representation correspondences (Englisch)
- Neue Suche nach: Narasamdya, Iman
- Neue Suche nach: Perin, Michael
- Neue Suche nach: Narasamdya, Iman
- Neue Suche nach: Perin, Michael
In:
ETAPS, Joint European Conferences on Theory and Practice of Software, 2009, FASE, International Conference on Fundamental Approaches to Software Engineering, 12
;
309-324
;
2009
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Certification of smart-card applications in common criteria: Proving representation correspondences
-
Weitere Titelangaben:Common-Criteria-Zertifizierung von Smart-Card-Anwendungen
-
Beteiligte:Narasamdya, Iman ( Autor:in ) / Perin, Michael ( Autor:in )
-
Erschienen in:Lecture Notes in Computer Science ; 5503 ; 309-324
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2009
-
Format / Umfang:16 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Scalable Analysis of Scalable SystemsClark, A. / Gilmore, S. / Tribastone, M. et al. | 2009
- 18
-
Rewriting Logic Semantics and Verification of Model TransformationsBoronat, A. / Heckel, R. / Meseguer, J. et al. | 2009
- 34
-
Confluence in Domain-Independent Product Line TransformationsOldevik, J. / Haugen, O. / Moller-Pedersen, B. et al. | 2009
- 49
-
Object Flow Definition for Refined Activity DiagramsJurack, S. / Lambers, L. / Mehner, K. / Taentzer, G. / Wierse, G. et al. | 2009
- 64
-
A Category-Theoretical Approach to the Formalisation of Version Control in MDERutle, A. / Rossini, A. / Lamo, Y. / Wolter, U. et al. | 2009
- 79
-
Controller Synthesis from LSC RequirementsKugler, H. / Plock, C. / Pnueli, A. et al. | 2009
- 94
-
Interface Generation and Compositional Verification in JavaPathfinderGiannakopoulou, D. / Pasareanu, C.S. et al. | 2009
- 109
-
A Formal Way from Text to Code TemplatesWachsmuth, G. et al. | 2009
- 124
-
Context-Aware Adaptive Services: The PLASTIC ApproachAutili, M. / Di Benedetto, P. / Inverardi, P. et al. | 2009
- 140
-
Synchronous Modeling and Validation of Priority Inheritance SchedulersJahier, E. / Halbwachs, N. / Raymond, P. et al. | 2009
- 155
-
Describing and Analyzing Behaviours over Tabular Specifications Using (Dyn) AlloyAguirre, N.M. / Frias, M.F. / Moscato, M.M. / Maibaum, T.S.E. / Wassyng, A. et al. | 2009
- 171
-
Reducing the Costs of Bounded-Exhaustive TestingJagannath, V. / Lee, Y.Y. / Daniel, B. / Marinov, D. et al. | 2009
- 186
-
Logical Testing: Hoare-style Specification Meets Executable ValidationGray, K.E. / Mycroft, A. et al. | 2009
- 201
-
Cross-Entropy-Based Replay of Concurrent ProgramsChockler, H. / Farchi, E. / Godlin, B. / Novikov, S. et al. | 2009
- 216
-
Control Dependence for Extended Finite State MachinesAndroutsopoulos, K. / Clark, D. / Harman, M. / Li, Z. / Tratt, L. et al. | 2009
- 231
-
Proving Consistency of Pure Methods and Model FieldsRustan, K. / Leino, M. / Middelkoop, R. et al. | 2009
- 246
-
On the Implementation of @preKosiuczenko, P. et al. | 2009
- 262
-
Formal Specification and Analysis of Timing Properties in Software SystemsAlTurki, M. / Dhurjati, D. / Yu, D. / Chander, A. / Inamura, H. et al. | 2009
- 278
-
Formal Foundation for Pattern-Based ModellingBottoni, P. / Guerra, E. / de Lara, J. et al. | 2009
- 294
-
Problem-Oriented Documentation of Design PatternsFulleborn, A. / Meffert, K. / Heisel, M. et al. | 2009
- 309
-
Certification of Smart-Card Applications in Common Criteria: Proving Representation CorrespondencesNarasamdya, I. / Perin, M. et al. | 2009
- 325
-
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government NetworksHermann, F. / Ehrig, H. / Ermel, C. et al. | 2009
- 340
-
A Formal Connection between Security Automata and JML AnnotationsHuisman, M. / Tamalet, A. et al. | 2009
- 355
-
Algorithms for Automatically Computing the Causal Paths of FailuresSumner, W.N. / Zhang, X. et al. | 2009
- 370
-
Mining API Error-Handling Specifications from Source CodeAcharya, M. / Xie, T. et al. | 2009
- 385
-
SNIFF: A Search Engine for Java Using Free-Form QueriesChatterjee, S. / Juvekar, S. / Sen, K. et al. | 2009
- 401
-
Inquiry and Introspection for Non-deterministic Queries in Mobile NetworksRajamani, V. / Julien, C. / Payton, J. / Roman, G.-C. et al. | 2009
- 417
-
HOL-TestGen: An Interactive Test-Case Generation FrameworkBrucker, A.D. / Wolff, B. et al. | 2009
- 421
-
CADS^*: Computer-Aided Development of Self-^* SystemsCalinescu, R. / Kwiatkowska, M. et al. | 2009
- 425
-
HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static AnalysisChen, Q. / Wang, L. / Yang, Z. / Stoller, S.D. et al. | 2009
- 440
-
Accurate and Efficient Structural Characteristic Feature Extraction for Clone DetectionNguyen, H.A. / Nguyen, T.T. / Pham, N.H. / Al-Kofahi, J.M. / Nguyen, T.N. et al. | 2009
- 456
-
Enhanced Property Specification and Verification in BLASTSery, O. et al. | 2009
- 470
-
Finding Loop Invariants for Programs over Arrays Using a Theorem ProverKovacs, L. / Voronkov, A. et al. | 2009