Structuring and Visualising an IC-card Security Standard
نویسندگان
چکیده
The standard way of visualising protocols using pictures with boxes and arrows is insufficient to study the protocols in detail. The problem is that the structuring of the protocols relies on elements not explicit in the standard visual rendering. To solve the problem one should visualise not only the operations and the messages but also the state and the security. Using an object oriented data flow model makes it possible to explicitly render the security and the state manipulations of the protocols. The required combination of data flow, object orientedness and visual programming is provided by the Prograph language. This language has been used to build a prototype of some of the protocols in the load purse transaction of the CEN Inter-sector electronic purse draft standard. The resulting conformant prototype provides abstract and concrete views on the system at all significant levels. The prototype supports animation of the standard, giving the protocol designer feedback on design decisions.
منابع مشابه
Visualising the structure of an IC - card
The standard way of visualising protocols using pictures with boxes and arrows is insufcient to study the protocols in detail. The problem is that the structuring of the protocols relies on elements not explicit in the standard visual rendering. To solve the problem one should visualise not only the operations and the messages but also the state and the security. Using an object oriented data o...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملDesign and Implementation of a RFC3161-Enhanced Time-Stamping Service
As the Internet grows in scale almost every year, security measures are expected to become all the more important on the Internet. A time-stamping authority (TSA) is a trusted authority which provides a proof that a datum existed before a particular time. In this research, we designed and implemented a RFC3161-compliant trusted time-stamping service (TTS) over the Internet. Software for the TTS...
متن کاملTransit Payment System Security WP
The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is ...
متن کامل