Modelling the Security of Smart Cards by Hard and Soft Types for Higher-Order Mobile Embedded Resources
نویسندگان
چکیده
We provide a type system inspired by affine intuitionistic logic for the calculus of Higher-Order Mobile Embedded Resources (Homer), resulting in the first process calculus combining affine linear (non-copyable) and non-linear (copyable) higher-order mobile processes, nested locations, and local names. The type system guarantees that linear resources are neither copied nor embedded in non-linear resources during computation. We exemplify the use of the calculus by modelling a simplistic e-cash Smart Card system, the security of which depends on the interplay between (linear) mobile hardware, embedded (non-linear) mobile processes, and local names. A purely linear calculus would not be able to express that embedded software processes may be copied. Conversely, a purely non-linear calculus would not be able to express that mobile hardware processes cannot be copied.
منابع مشابه
Typing Linear and Non-Linear Higher- Order Mobile Embedded Resources with Local Names
We provide the first process calculus combining (affine) linear and non-linear higher-order mobile processes, nested locations, and local names. We do so by extending the type and effect system of Homer, a calculus of non-linear Higher-Order Mobile Embedded Resources, with a distinction between affine linear and non-linear locations (akin to reference types) and uses of variables (as in the lin...
متن کاملSmart Cards , Tokens , Security and Applications ”
This book provides an overview of secure chips and their applications. It mainly focuses on two types of tokens: contact and contactless. Except a brief introduction to Trusted Platform Modules (TPM), the book does not detail embedded IC or Hardware Secure Modules (HSM). The book depicts the major operating systems and environments (Java Card, Global Platform, MultOS, ...) and describes in deta...
متن کاملYour System is Secure? Prove it!
Computer security is an old problem which has lost none of its relevance — as is evidenced by the annual Security issue of ;login:. The systems research community has increased its attention to security issues in recent years, as can be seen by an increasing number of security-related papers published in the mainstream systems conferences SOSP, OSDI, and USENIX. However, the focus is primarily ...
متن کاملEnergy Consumption for Cryptographic Algorithms with Different Clocks on Smart Cards in Mobile Devices
In mobile devices, smart cards become the trend and are used in numerous applications and services. Since mobile devices are battery-powered, so it is important to find energy saving solutions to reduce energy consumption. Most mobile devices are powered by batteries with limited power capacity. In order to protect information during the communication process, security system designers use many...
متن کاملBiometric User Authentication on Smart Cards by Means of Handwritten Signatures
This paper describes a biometric method for user authentication on smart cards. Smart cards are chip cards with the ability for data processing directly on the card. They are not only usable for storing biometric reference data, but biometric user authentication methods can also be performed on card in order to protect security-relevant functions or data on the cards. The biometric data under c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electr. Notes Theor. Comput. Sci.
دوره 194 شماره
صفحات -
تاریخ انتشار 2007