Formalizing the safety of Java, the Java virtual machine, and Java card
ACM Computing Surveys (CSUR)
Ownership, encapsulation and the disjointness of type and effect
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Bytecode verification on Java smart cards
Software—Practice & Experience
Tool-Assisted Specification and Verification of the JavaCard Platform
AMAST '02 Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology
TPHOLs '01 Proceedings of the 14th International Conference on Theorem Proving in Higher Order Logics
A Flexible Invocation Framework for Java Card
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
On-Card Bytecode Verification for Java Card
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
An Operational Semantics of the Java Card Firewall
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
A Simple(r) Interface Distribution Mechanism for Java Card
JavaCard '00 Revised Papers from the First International Workshop on Java on Smart Cards: Programming and Security
Formal Specification and Verification of JavaCard's Application Identifier Class
JavaCard '00 Revised Papers from the First International Workshop on Java on Smart Cards: Programming and Security
Java Bytecode Verification: An Overview
CAV '01 Proceedings of the 13th International Conference on Computer Aided Verification
Secure Information Flow and Pointer Confinement in a Java-like Language
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Java Bytecode Verification: Algorithms and Formalizations
Journal of Automated Reasoning
Lightweight Bytecode Verification
Journal of Automated Reasoning
Increased Information Flow Needs for High-Assurance Composite Evaluations
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Developing smart card applications using the OpenCard Framework
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Securing e-business applications using smart cards
IBM Systems Journal - End-to-end security
Statically checking confidentiality via dynamic labels
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Stack-based access control and secure information flow
Journal of Functional Programming
Secure Distributed Computing on a Java Card" Grid
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 5 - Volume 06
Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
A low-footprint class loading mechanism for embedded Java virtual machines
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
High performance annotation-aware JVM for Java cards
Proceedings of the 5th ACM international conference on Embedded software
BIT: A Very Compact Scheme System for Microcontrollers
Higher-Order and Symbolic Computation
Customised Induction Rules for Proving Correctness of Imperative Programs
SEFM '05 Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods
Storing a persistent transactional object heap on flash memory
Proceedings of the 2006 ACM SIGPLAN/SIGBED conference on Language, compilers, and tool support for embedded systems
Flexible and fast security solution for wireless LAN
Pervasive and Mobile Computing
A framework for decentralized access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
The ExoVM system for automatic VM and application reduction
Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation
Secure object flow analysis for java card
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Building an "impossible" verifier on a java card
WIESS'02 Proceedings of the 2nd conference on Industrial Experiences with Systems Software - Volume 2
Developing Java Card Applications with B
Electronic Notes in Theoretical Computer Science (ENTCS)
Instruction-level security analysis for information flow in stack-based assembly languages
Information and Computation
The implementation of signing e-documents by using the Wireless Identity Module of cellular phones
International Journal of Mobile Communications
Security and privacy for the next wireless generation
International Journal of Network Management
On the use of metatypes for safe embedded operating system extension
International Journal of Parallel, Emergent and Distributed Systems
Secure mobile electronic card used in medical services
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
Solution for non-repudiation in GSM WAP applications
SEPADS'08 Proceedings of the 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Verified Software: Theories, Tools, Experiments
Evaluation of Java Card Performance
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
BSmart: A Tool for the Development of Java Card Applications with the B Method
ABZ '08 Proceedings of the 1st international conference on Abstract State Machines, B and Z
A controllable and accountable state-oriented Card-Aided Firewall
Computer Standards & Interfaces
Smart card based solution for non-repudiation in GSM WAP applications
WSEAS Transactions on Computers
Specification and Runtime Verification of Java Card Programs
Electronic Notes in Theoretical Computer Science (ENTCS)
Applying Context-Aware Computing in Dependent Environments
IWINAC '09 Proceedings of the 3rd International Work-Conference on The Interplay Between Natural and Artificial Computation: Part II: Bioinspired Applications in Artificial and Natural Computation
Multiapplication smart card: Towards an open smart card?
Information Security Tech. Report
Smart cards and remote computing: Interaction or convergence?
Information Security Tech. Report
Efficient execution of application applets based on persistent object caching in Java card system
Proceedings of the 2009 International Conference on Hybrid Information Technology
Towards self-authenticable smart cards
Computer Communications
Design and implementation of a smart card based healthcare information system
Computer Methods and Programs in Biomedicine
Efficient off-board deployment and customization of virtual machine-based embedded systems
ACM Transactions on Embedded Computing Systems (TECS)
Specifying Java Card API in OCL
Electronic Notes in Theoretical Computer Science (ENTCS)
A Space-Aware Bytecode Verifier for Java Cards
Electronic Notes in Theoretical Computer Science (ENTCS)
Preventing Timing Leaks Through Transactional Branching Instructions
Electronic Notes in Theoretical Computer Science (ENTCS)
A very small bytecode-verifier based on PCC algorithm for smart card
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
An efficient small sized on-card verifier for java card
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
A program logic for handling JAVACARD's transaction mechanism
FASE'03 Proceedings of the 6th international conference on Fundamental approaches to software engineering
Performance evaluation of java card bytecodes
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Reverse engineering java card applets using power analysis
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Applet verification strategies for RAM-constrained devices
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Computer security from a programming language and static analysis perspective
ESOP'03 Proceedings of the 12th European conference on Programming
KeY: a formal method for object-oriented systems
FMOODS'07 Proceedings of the 9th IFIP WG 6.1 international conference on Formal methods for open object-based distributed systems
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Secure failure detection in TrustedPals
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
Integrating verification and testing of object-oriented software
TAP'08 Proceedings of the 2nd international conference on Tests and proofs
Verification of object-oriented software: The KeY approach
Verification of object-oriented software: The KeY approach
On development of inspection system for biometric passports using Java
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
Experimental comparison of concolic and random testing for java card applets
SPIN'10 Proceedings of the 17th international SPIN conference on Model checking software
Smart card technology used in secured personal identification systems
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
Application-binding protocol in the user centric smart card ownership model
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Towards a secure and practical multifunctional smart card
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Romization: early deployment and customization of java systems for constrained devices
CASSIS'05 Proceedings of the Second international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Enhancing login security through the use of keystroke input dynamics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
The research on how to reduce the number of EEPROM writing to improve speed of java card
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Application-Driven customization of an embedded java virtual machine
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A high performance buffering of java objects for java card systems with flash memory
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Applying the b method for the rigorous development of smart card applications
ABZ'10 Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z
Verification of safety properties in the presence of transactions
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Smart card research perspectives
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Formalisation and verification of java card security properties in dynamic logic
FASE'05 Proceedings of the 8th international conference, held as part of the joint European Conference on Theory and Practice of Software conference on Fundamental Approaches to Software Engineering
Embedded Systems Design
Personalized access to semantic web agents using smart cards
Euro-Par'05 Proceedings of the 11th international Euro-Par conference on Parallel Processing
JCML: A specification language for the runtime verification of Java Card programs
Science of Computer Programming
Secure payment protocol for healthcare using USIM in ubiquitous
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
TrustedPals: secure multiparty computation implemented with smart cards
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Formal reasoning about non-atomic java card methods in dynamic logic
FM'06 Proceedings of the 14th international conference on Formal Methods
Firewall mechanism in a user centric smart card ownership model
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Developing efficient blinded attribute certificates on smart cards via pairings
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Privacy and security enhanced offline oblivious transfer for massive data distribution
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Design and implementation of an embedded python run-time system
USENIX ATC'12 Proceedings of the 2012 USENIX conference on Annual Technical Conference
JCSI: A tool for checking secure information flow in Java Card applications
Journal of Systems and Software
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card
International Journal of Information Security and Privacy
On the dictionary compression for Java card environment
Proceedings of the 16th International Workshop on Software and Compilers for Embedded Systems
Hi-index | 0.00 |
From the Book:Audience for This Book Java Card™ technology combines a subset of the Java programming language with a runtime environment optimized for smart cards and other memory-constrained devices. This book is intended for a wide technical audience with different needs of understanding Java Card technology. First and foremost, it is written for Java Card applet developers. You will find a smart card tutorial, in-depth discussions on various Java Card features, helpful programming tips for applet development, and the reference to the Java Card APIs. Second, this book is supplementary reading for Java Card platform implementors. It provides further discussion of many topics in the Java Card specifications and includes code examples to clarify those topics. Third, this book is useful for technical managers or anyone who wants to gain an overall understanding of Java Card technology. In particular, the first three chapters are introductions to orient you within the technology from both a technical and marketing point of view. Throughout this book, I assume that readers are familiar with the fundamentals of the Java language. For those who want to learn more about the Java language, the book by Arnold and Gosling is a good resource. Organization of This Book This book is written in a bottom-up fashion. Each chapter was a step to the next one, so it is best if you read the chapters in order. Part 1: Introduction Chapter 1 introduces smart cards and Java Card technology—history, benefits, and applications. Chapter 2 discusses smart card basics as a foundation forexploring the rest of the book. Part 2: Java Card Technology Chapter 3 gives an overview of Java Card technology—the system architecture and its components. Chapter 4 discusses the properties and the behavior of persistent and transient objects in the Java Card platform and how to create and use those objects. Chapter 5 explains what atomicity means in the Java Card platform and how to develop an applet using transactions to protect data integrity. Chapter 6 discusses exceptions in the Java Card platform and how applets throw and handle exceptions. Chapter 7 explains how applets run within the JCRE and demonstrates the techniques of applet writing. Chapter 8 describes the techniques of handling APDUs in an applet. Chapter 9 explains the behavior of objects, exceptions, and applets under the control of the applet firewall and discusses how applets can safely share data using object sharing mechanisms. Chapter 10 first introduces many important cryptographic concepts and algorithms. It then outlines the cryptographic APIs in the Java Card platform and demonstrates how to use these APIs through code examples. Chapter 11 describes the security features in the Java Card platform and discusses how these security features are enforced through a variety of mechanisms. Along with the discussion, this chapter summarizes the topics covered in Part 2. Part 3: Programming Guide and Tips Chapter 12 walks you through a step-by-step process of creating a simple electronic wallet applet. Chapter 13 provides a number of recommendations for optimizing applets. In many cases, a discussion is provided with the recommendation to help you understand various design trade-offs. Chapter 14 discusses issues related to using the int data type when writing Java Card applets. Part 4: Appendices Appendix A describes the subset of the Java programming language that is supported in the Java Card platform. Appendix B provides a comprehensive reference to the Java Card 2.1 APIs. The Version Covered in This Book This book is based on Java Card version 2.1, the latest release when the book was written. At the meantime, the next version 2.1.1 is underway. Version 2.1.1 will include minor enhancement updates to version 2.1. The contents and techniques covered in the book will continue to be relevant to future Java Card releases, and new things will be incorporated in future editions of this book. Retrieving Additional Information On-line You can get the latest on Java Card technology or the latest Java Card development kit from the Java Card web site at http://java.sun.com/products/javacard. For updated information about this book, visit http://java.sun.com/books/series/javacard.