Securing Multi-Application Smart Cards by Security-by-Contract
نویسندگان
چکیده
The Security-by-Contract (S×C) framework has recently been proposed to support applications evolution in multi-application smart cards. The key idea is based on the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of a smart card. In this paper we address one of the key features needed to apply the S×C idea to a resource limited device such as a smart card, namely the outsourcing of the contract-policy matching to a Trusted Third Party. The design of the overall system as well as a first implemented prototype are presented. KeywordsMulti-Application Smart Cards; Security; Contract Matching.
منابع مشابه
SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards
The Security-by-Contract (S×C) framework has recently been proposed to support software evolution in open multi-application smart cards. The key idea lies in the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of the card hosting the application. In this paper we address a key issue to realize the S×C idea, namely th...
متن کاملMulti-Application Smart Cards: Card Operating Systems and Application Security
Multi-Application Smart Cards are becoming more prevalent in society as the need to secure electronic transactions increases for both e-commerce and identity verification purposes. This paper studies two Multi-Application Smart Cards and their Operating Systems, namely the MULTOS Card and the Sun Java Card. This research provides an in-depth analysis of the efficacy of the mechanisms used to ve...
متن کاملLoad time Policy Checker for open multi-application smart cards
Applications on multi-application smart cards contain sensitive data and can exchange information. Thus a major concern is that these applications should not exchange data unless permitted by their respective policy. As modern smart cards allow post-issuance installation and removal of applications, traditional approaches for information flow analysis are not suitable. We suggest the Security-b...
متن کاملCan We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?
Java card technology have progressed at the point of running web servers and web clients on a smart card. Yet concrete deployment of multi-applications smart cards have remained extremely rare because the business model of the asynchronous download and update of applications by different parties requires the control of interactions among possible applications after the card has been fielded. Ye...
متن کاملHigh-level algorithms and data structures requirements for security-by-contract on Java cards
The Java Card technology has progressed to the point of running web servers and web clients on a smart card. Yet concrete deployments of multi-applications smart cards have remained extremely rare because the business model of the asynchronous download and update of applications by different parties requires the control of interactions among possible applications after the card has been fielded...
متن کامل