2002
DOI: 10.1007/3-540-45923-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Compositional Verification of Secure Applet Interactions

Abstract: Abstract. Recent developments in mobile code and embedded systems have led to an increased interest in open platforms, i.e. platforms which enable different applications to interact in a dynamic environment. However, the flexibility of open platforms presents major difficulties for the (formal) verification of secure interaction between the different applications. To overcome these difficulties, compositional verification techniques are required. This paper presents a compositional approach to the specificatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
14
0

Year Published

2003
2003
2011
2011

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(15 citation statements)
references
References 16 publications
1
14
0
Order By: Relevance
“…They generalise 3 the concepts introduced in [4] which was inspired by [12]. In particular, this model allows us to catch security properties considered in [4], see also [12,3,18]. The ret points are the returning points of the function.…”
Section: Motivation: Program Modelsmentioning
confidence: 99%
See 4 more Smart Citations
“…They generalise 3 the concepts introduced in [4] which was inspired by [12]. In particular, this model allows us to catch security properties considered in [4], see also [12,3,18]. The ret points are the returning points of the function.…”
Section: Motivation: Program Modelsmentioning
confidence: 99%
“…This result could actually be refined seeing that T P,m is of finite degree: this implies that it is a context-free graph. Therefore, it can be constructed as the configuration graph of a pushdown automaton (see [14]), recovering the result of [4].…”
Section: Motivation: Program Modelsmentioning
confidence: 99%
See 3 more Smart Citations