The B-book: assigning programs to meanings
The B-book: assigning programs to meanings
Smart Card Handbook
B '98 Proceedings of the Second International B Conference on Recent Advances in the Development and Use of the B Method
Introducing Dynamic Constraints in B
B '98 Proceedings of the Second International B Conference on Recent Advances in the Development and Use of the B Method
JBTools: an experimental platform for the formal B method
PPPJ '02/IRE '02 Proceedings of the inaugural conference on the Principles and Practice of programming, 2002 and Proceedings of the second workshop on Intermediate representation engineering for virtual machines, 2002
Towards a Full Formal Specification of the JavaCard API
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Relaxing restrictions on invariant composition in the B method by ownership control a la SPEC#
Rigorous Methods for Software Construction and Analysis
B'07 Proceedings of the 7th international conference on Formal Specification and Development in B
Hi-index | 0.00 |
This document describes an industrial application of the B method in smart card applications. In smart card memory, data modification may be interrupted due to a card withdrawal or a power loss. The EEPROM memory may result in an unstable state and the values subsequently read may be erroneous. The transaction mechanism provides a secure means for modifying data located in the EEPROM. As the security in smart card applications is paramount, the use of the B formal method brings high confidence and provides mathematical proof that the design of the transaction mechanism fulfills the security requirements.