Advertisement

Keywords

Information System System Operator Software Engineer Fail Load Data Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

5.6 Notes

  1. [ABKL93]
    M. Abadi, M. Burrows, C. Kaufman, and B. Lampson. Authentication and delegation with smart-cards. Science of Computer Programming, 21(2):93–113, 1993.CrossRefGoogle Scholar
  2. [AFG02]
    M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Information and Computation, 174(1):37–83, 2002.CrossRefMathSciNetGoogle Scholar
  3. [AJSW00]
    N. Asokan, P. Janson, M. Steiner, and M. Waidner. State of the art in electronic payment systems. Advances in Computers, 53:425–449, 2000.Google Scholar
  4. [And99]
    R. Anderson. The formal verification of a payment system. In M. Hinchey and J. Bowen, editors, Industrial-Strength Formal Methods in Practice, pages 43–52. Springer, Berlin Heidelberg New York, 1999.Google Scholar
  5. [APS99]
    V. Apostolopoulos, V. Peris, and D. Saha. Transport layer security: How much does it really cost? In Conference on Computer Communications (IEEE Infocom), pages 717–725. IEEE Computer Society, New York, March 1999.Google Scholar
  6. [Gon99]
    L. Gong. Inside Java 2 Platform Security — Architecture, API Design, and Implementation. Addison-Wesley, Reading, MA, 1999.Google Scholar
  7. [HMR+98]_F. Huber, S. Molterer, A. Rausch, B. Schätz, M. Sihling, and O. Slotosch. Tool supported specification and simulation of distributed systems. In International Symposium on Software Engineering for Parallel and Distributed Systems, pages 155–164, 1998.Google Scholar
  8. [Jür01e]
    J. Jürjens. Modelling audit security for smart-card payment schemes with UMLsec. In M. Dupuy and P. Paradinas, editors, Trusted Information: The New Decade Challenge, pages 93–108. International Federation for Information Processing (IFIP), Kluwer Academic, Dordrecht, 2001. Proceedings of the 16th International Conference on Information Security (SEC 2001).Google Scholar
  9. [Jür0lg]
    J. Jürjens. Secrecy-preserving refinement. In International Symposium on Formal Methods Europe (FME), volume 2021 of Lecture Notes in Computer Science, pages 135–152. Springer, Berlin Heidelberg New York, 2001.Google Scholar
  10. [Jür0lh]
    J. Jürjens. Secure Java development with UMLsec. In B. De Decker, F. Piessens, J. Smits, and E. Van Herrenweghen, editors, Advances in Network and Distributed Systems Security, pages 107–124. International Federation for Information Processing (IFIP) TC-11 WG 11.4, Kluwer Academic, Dordrecht, 2001. Proceedings of the First Annual Working Conference on Network Security (I-NetSec 2001).Google Scholar
  11. [Jür02e]
    J. Jürjens. Methodische Entwicklung sicherer CORBA-Anwendungen. In P. Horster, editor, Enterprise Security. IT-Verlag, Sauerlach, 2002.Google Scholar
  12. [Jür04c]
    J. Jürjens. Developing high-assurance secure systems with UML: An electronic purchase protocol. In Eighth IEEE International Symposium on High Assurance Systems Engineering (RASE 2004), pages 231–240. IEEE Computer Society, New York, 2004.Google Scholar
  13. [JW0la]
    J. Jürjens and G. Wimmel. Formally testing fail-safety of electronic purse protocols. In 16th International Conference on Automated Software Engineering (ASE 2001), pages 408–411. IEEE Computer Society, New York, 2001.Google Scholar
  14. [JW0lb]
    J. Jürjens and G. Wimmel. Security modelling for electronic commerce: The Common Electronic Purse Specifications. In B. Schmid, K. Stanoevska-Slabeva, and V. Tschammer, editors, Towards the E-Society: E-Commerce, E-Business, and E-Government, pages 489–506. International Federation for Information Processing (IFIP), Kluwer Academic, Dordrecht, 2001. First IFIP Conference on E-Commerce, E-Business, and E-Government (I3E 2001).Google Scholar
  15. [Kar00]
    G. Karjoth. Java and mobile code security — an operational semantics of Java 2 access control. In Computer Security Foundations Workshop (CSFW), pages 224–232, 2000.Google Scholar
  16. [KG98]
    L. Kassab and S. Greenwald. Towards formalizing the Java Security Architecture in JDK 1.2. In Y. Deswarte, C. Meadows, and D. Gollmann, editors. European Symposium on Research in Computer Security (ESORICS), volume 1485 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York, 1998 Quisquater et al [QDMG98], pages 191–207.Google Scholar
  17. [NPW02]
    T. Nipkow, L. C. Paulson, and M. Wenzel. Isabelle/HOL-A Proof Assistant for Higher-Order Logic. Springer, Berlin Heidelberg New York, 2002.Google Scholar
  18. [Pau98a]
    L. C. Paulson. Inductive analysis of the Internet protocol TLS (transcript of discussion). In B. Christianson, B. Crispo, W. S. Harbison, and M. Roe, editors, Security Protocols, volume 1550 of Lecture Notes in Computer Science, pages 13–23. Springer, Berlin Heidelberg New York, 1998. 6th International Workshop.Google Scholar
  19. [RE00]
    W. Rankl and W. Effing. Smart Card Handbook. John Wiley & Sons, New York, 2000. 2nd edition.Google Scholar
  20. [SCW00]
    S. Stepney, D. Cooper, and J. Woodcock. An Electronic Purse: Specification, Refinement, and Proof. Oxford University Computing Laboratory, 2000. Technical Monograph PRG-126.Google Scholar
  21. [WF98]
    D. S. Wallach and E. W. Felten. Understanding Java stack inspection. In IEEE Symposium on Security and Privacy (S&P), page 52ff, 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Personalised recommendations