Analysis of Security Models For Smart Cards
نویسنده
چکیده
Smart cards are an old breed of ubiquitous embedded-computing devices that are increasingly gaining popularity for electronic business transactions. When these smart cards are used over networks that can be covertly snooped, such as the Internet, there is a potential threat to the security of these transactions. In this report, I describe and analyze security models for smart cards that are used for electronic commerce. An analysis of the security components of JavaCard technology, a relatively new software platform for running Java applications on smart cards, is also presented. I briefly introduce and analyze the concept of secure coprocessing and trusted co-servers which, when augmented with JavaCard, can guarantee security of electronic transactions.
منابع مشابه
Specification and verification of security policies for smart cards
Security systems that use smart cards are nowadays an important part of our daily life, which becomes increasingly dependent on the reliability of such systems, for example cash cards, electronic health cards or identification documents. Since a security policy states both the main security objectives and the security functions of a certain security system, it is the basis for the reliable syst...
متن کاملThe difficulty of standardising Smart Card Security Evaluation∗
There is a need for assessing the security of smart cards by an independent third party, specially if multi-application smart cards become reality. Intuitively, the methods to obtain this could be derived from the computer industry where security evaluation already is commonplace, but because of the special properties of smart cards, this seems very difficult. The article discusses the problems...
متن کاملData Security Analysis and Security Extension for Smart Cards Using Java Card
Smart cards improve the convenience and security of any transaction. They provide tamper-proof storage of user and account identity. Multifunction cards are used to manage network system access, store value and other data. The cards carry personal account, credit and buying-preference information and thus, security becomes a primary issue here. Public Key Cryptography plays an essential role in...
متن کاملThe Diiculty of Standardising Smart Card Security Evaluation 1]based On: Jos93]
There is a need for assessing the security of smart cards by an independent third party, specially if multi-application smart cards become reality. Intuitively, the methods to obtain this could be derived from the computer industry where security evaluation already is commonplace, but because of the special properties of smart cards, this seems very diicult. The article discusses the problems r...
متن کاملModelling Security Protocols based on Smart Cards
Security protocols based on smart cards lack formal analysis. The theoretic analysis by Bellare & Rogaway is the best example in this small eld. We propose an alternative approach obtained as an extension to Paulson's Inductive Approach, which is based on theorem proving. Our model certainly relies on a consistently smaller formal overhead, but carries adequate expressiveness allowing smart car...
متن کامل