Firewall Mechanism in a User Centric Smart Card Ownership Model

Conference object English OPEN
Akram , Raja Naeem; Markantonakis , Konstantinos; Mayes , Keith;

International audience; Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well ... View more
  • References (24)
    24 references, page 1 of 3

    1. D. Deville, A. Galland, G. Grimaud, and S. Jean, “Smart card operating systems: Past, present and future,” in In Proceedings of the 5 th NORDU/USENIX Conference, 2003.

    2. D. Sauveron, “Multiapplication Smart Card: Towards an Open Smart Card?” Inf. Secur. Tech. Rep., vol. 14, no. 2, pp. 70-78, 2009.

    3. S. Chaumette and D. Sauveron, “New Security Problems Raised by Open Multiapplication Smart Cards. .” LaBRI, Université Bordeaux 1., pp. 1332-04, 2004.

    4. Z. Chen, Java Card Technology for Smart Cards: Architecture and Programmer's Guide. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 2000.

    5. M. Montgomery and K. Krishna, “Secure Object Sharing in Java Card,” in WOST'99: Proceedings of the USENIX Workshop on Smartcard Technology. Berkeley, CA, USA: USENIX Association, 1999, pp. 14-14.

    6. M. Éluard, T. P. Jensen, and E. Denney, “An Operational Semantics of the Java Card Firewall,” in E-SMART '01: Proceedings of the International Conference on Research in Smart Cards. London, UK: Springer, 2001, pp. 95-110.

    7. C. Bernardeschi and L. Martini, “Enforcement of Applet Boundaries in Java Card Systems,” in IASTED Conf. on Software Engineering and Applications, 2004, pp. 96-101.

    8. Java Card Platform Specification; Application Programming Interface, Runtime Environment Specification, Virtual Machine Specification, Sun Microsystem Inc Std. Version 2.2.2, March 2006. [Online]. Available: specs.html

    9. Multos: The Multos Specification,, Online, Std.

    10. M. Huisman, D. Gurov, C. Sprenger, and G. Chugunov, “Checking Absence of Illicit Applet Interactions: A Case Study,” in Fundamental Approaches to Software Engineering, FASE 2004. Springer, 2004.

  • Metrics
Share - Bookmark