Firewall Mechanism in a User Centric Smart Card Ownership Model
نویسندگان
چکیده
Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is not analysed in the User Centric Smart Card Ownership Model (UCOM) that delegates the smart card control to their users. In this paper, we present UCOM’s security requirements for the firewall mechanism and propose a generic framework that satisfies them.
منابع مشابه
Application Management Framework in User Centric Smart Card Ownership Model
The predominant smart card ownership model is the issuer centric, and it has played a vital role in the proliferation of the technology. However, recent developments of multi-application smart card technology lead to new potential ownership models. One of the possible models is the User Centric Smart Card Ownership Model. In this model, the ownership is with smart card users. To support user’s ...
متن کاملA Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism
Smart cards have been deployed as trusted components in a wide range of industries. The basis of the trust on a smart card platform and applications is static and evaluated before the card issuance to cardholders. A dynamic and post-issuance security assurance and validation mechanism can be useful, but it is not considered necessary in the Issuer Centric Smart Card Ownership Model. However, in...
متن کاملA user centric security model for tamper-resistant devices
In this thesis we propose a design for a ubiquitous and interoperable device based on the smart card architecture to meet the challenges of privacy, trust, and security for traditional and emerging technologies like personal computers, smart phones and tablets. Such a device is referred a User Centric Tamper-Resistant Device (UCTD). To support the smart card architecture for the UCTD initiative...
متن کاملRemote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators
User Centric Smart Card Ownership Model (UCOM) gives the freedom of choice of respective applications to the smart card users. The user-centric architecture requires a trusted entity to be present on the smart card to provide security assurance and validation to the requesting application providers. In this paper, we propose the inclusion of a trusted computing platform for smart cards that we ...
متن کاملApplication-Binding Protocol in the User Centric Smart Card Ownership Model
The control of the application choice is delegated to the smart card users in the User Centric Smart Card Ownership Model (UCOM). There is no centralised authority that controls the card environment, and it is di cult to have implicit trust on applications installed on a smart card. The application sharing mechanism in smart cards facilitates corroborative and interrelated applications to co-ex...
متن کامل