메뉴 건너뛰기




Volumn 10, Issue 4, 2002, Pages 339-367

Verified formal security models for multiapplicative smart cards

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; CRYPTOGRAPHY; DATA STRUCTURES; ERROR CORRECTION; FORMAL LANGUAGES; SECURITY OF DATA; SMART CARDS;

EID: 0036427441     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2002-10403     Document Type: Article
Times cited : (7)

References (28)
  • 2
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Technical Report ESD-TR-75-306, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, March
    • D.E. Bell and L.J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, Technical Report ESD-TR-75-306, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, March 1976. URL: http://csrc.nist.gov/publications/history/bell76.pdf.
    • (1976)
    • Bell, D.E.1    Lapadula, L.J.2
  • 3
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Technical Report ESD-TR-76-372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, April
    • K.J. Biba, Integrity Considerations for Secure Computer Systems, Technical Report ESD-TR-76-372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, April 1977.
    • (1977)
    • Biba, K.J.1
  • 4
    • 0003282331 scopus 로고    scopus 로고
    • A practical alternative to hierarchical integrity policies
    • Gaithersburg, MD, National Computer Security Center and National Bureau of Standards, 1985
    • W.E. Boebert and R.Y. Kain, A practical alternative to hierarchical integrity policies, in: 8th National Computer Security Conf., Gaithersburg, MD, National Computer Security Center and National Bureau of Standards, 1985, pp. 18-27.
    • 8th National Computer Security Conf. , pp. 18-27
    • Boebert, W.E.1    Kain, R.Y.2
  • 7
    • 0003765584 scopus 로고
    • Identification cards-identification cards-interrelated circuit(s) cards with contacts-part 4: Inter industry commands for interchange
    • ISO/IEC 7816-4, International Standards Organization
    • Identification cards-identification cards-interrelated circuit(s) cards with contacts-part 4: Inter industry commands for interchange, ISO/IEC 7816-4, International Standards Organization, 1995.
    • (1995)
  • 8
    • 0011326587 scopus 로고    scopus 로고
    • Information technology-security techniques-evaluation criteria for IT security
    • ISO/IEC 15408, International Standards Organization
    • Information technology-security techniques-evaluation criteria for IT security, ISO/IEC 15408, International Standards Organization, 1999. URL: http://csrc.nist.gov/cc.
    • (1999)
  • 9
    • 0003765598 scopus 로고
    • ITSEC; Office for Official Publications of the European Communities, Brussels, Belgium
    • ITSEC, Information Technology Security Evaluation Criteria, Version 1.2. Office for Official Publications of the European Communities, Brussels, Belgium, 1991.
    • (1991) Information Technology Security Evaluation Criteria, Version 1.2
  • 10
    • 0011272226 scopus 로고    scopus 로고
    • A new mandatory security policy combining secrecy and integrity
    • RC 21717, IBM Resarch Division, T.J. Watson Research Center, Yorktown Heights, NY, 15 March
    • P.A. Karger, V. Austel and D. Toll, A new mandatory security policy combining secrecy and integrity, RC 21717, IBM Resarch Division, T.J. Watson Research Center, Yorktown Heights, NY, 15 March 2000. URL: http://domino.watson.ibm.com/library/CyberDig.nsf/home.
    • (2000)
    • Karger, P.A.1    Austel, V.2    Toll, D.3
  • 11
    • 33644484966 scopus 로고    scopus 로고
    • Using a mandatory secrecy and integrity policy on smart cards and mobile devices
    • RC 21736
    • P.A. Karger, V. Austel and D. Toll, Using a mandatory secrecy and integrity policy on smart cards and mobile devices, in: (EUROSMART) Security Conference, Marseille, France, 2000, pp. 134-148, RC 21736 available at http://domino.watson.ibm.com/library/CyberDig.nsf/home.
    • (EUROSMART) Security Conference, Marseille, France, 2000 , pp. 134-148
    • Karger, P.A.1    Austel, V.2    Toll, D.3
  • 12
    • 0011326590 scopus 로고    scopus 로고
    • A generic security model for multiapplicative smarts cards-final report of the SMaCOS project
    • Unpublished, available from the authors
    • F. Koob, M. Ullmann, S. Wittmann, G. Schellhorn, W. Reif, A. Schairer and W. Stephan, A generic security model for multiapplicative smarts cards-final report of the SMaCOS project, Unpublished, available from the authors.
    • Koob, F.1    Ullmann, M.2    Wittmann, S.3    Schellhorn, G.4    Reif, W.5    Schairer, A.6    Stephan, W.7
  • 15
    • 0003307796 scopus 로고
    • Security models
    • J. Marciniak, ed., Wiley & Sons
    • J. McLean, Security models, in: Encyclopedia of Software Engineering, J. Marciniak, ed., Wiley & Sons, 1994 URL: http://chacs.nrl.navy.mil/publications/CHACS.
    • (1994) Encyclopedia of Software Engineering
    • McLean, J.1
  • 17
    • 0011355115 scopus 로고    scopus 로고
    • Philips semiconductors and IBM research to co-develop secure smart cards: Highly secure operating system and processor, suitable for multiple applications
    • Feb.
    • Philips semiconductors and IBM research to co-develop secure smart cards: Highly secure operating system and processor, suitable for multiple applications. URL: http://www.semiconductors.philips.com/news/content/file_384.html, Feb. 1999.
    • (1999)
  • 19
    • 0011272228 scopus 로고    scopus 로고
    • Structured specifications and interactive proofs with KIV
    • W. Bibel and P. Schmitt, eds, Kluwer Academic Publishers, Dordrecht
    • W. Reif, G. Schellhorn, K. Stenzel and M. Balser, Structured specifications and interactive proofs with KIV, in: Automated Deduction - A Basis for Applications, W. Bibel and P. Schmitt, eds, Kluwer Academic Publishers, Dordrecht, 1998.
    • (1998) Automated Deduction - A Basis for Applications
    • Reif, W.1    Schellhorn, G.2    Stenzel, K.3    Balser, M.4
  • 21
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • Technical Report CSL-92-02, SRI International, Menlo Park, CA
    • J. Rushby, Noninterference, Transitivity, and Channel-Control Security Policies, Technical Report CSL-92-02, SRI International, Menlo Park, CA, 1992. URL: http;//www.csl.sri.com/~rushby/reports/csl-92-2.dvi.Z.
    • (1992)
    • Rushby, J.1
  • 22
    • 0002604871 scopus 로고
    • A lattice interpretation of the chinese wall security policy
    • US Govt. Printing Office
    • R. Sandhu, A lattice interpretation of the chinese wall security policy, in: Proc. 15th NIST-NCSC National Computer Security Conference, US Govt. Printing Office, 1992, pp. 329-339.
    • (1992) Proc. 15th NIST-NCSC National Computer Security Conference , pp. 329-339
    • Sandhu, R.1
  • 23
    • 0027699087 scopus 로고
    • Lattice based access control models
    • R. Sandhu, Lattice based access control models, IEEE Computer 26(11) (1993), 9-19.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.1
  • 24
    • 0011319414 scopus 로고
    • Desingning the GEMSOS security kernel for security and performance
    • DoD Computer Security Center and National Bureau of Standards
    • R. Schell, T.F. Tao and M. Heckman, Desingning the GEMSOS security kernel for security and performance, in: 8th National Computer Security Conference, Gaithersburg, MD, DoD Computer Security Center and National Bureau of Standards, 1985, pp. 108-119.
    • (1985) 8th National Computer Security Conference, Gaithersburg, MD , pp. 108-119
    • Schell, R.1    Tao, T.F.2    Heckman, M.3
  • 27
    • 0011349857 scopus 로고
    • The controlled application set paradigm for trusted systems
    • National Computer Security Center and National Institute of Standards and Technology
    • D.F. Sterne and G.S. Benson, The controlled application set paradigm for trusted systems, in: 1995 National Information Systems Security Conference, Baltimore, Maryland, National Computer Security Center and National Institute of Standards and Technology, 1995. URL: http://www.tis.com/docs/research/secure/secure_dte_proj2.html.
    • (1995) 1995 National Information Systems Security Conference, Baltimore, Maryland
    • Sterne, D.F.1    Benson, G.S.2
  • 28
    • 0011319906 scopus 로고    scopus 로고
    • Ein verifiziertes Sicherheitsmodell fuer multiapplikative Smartcards
    • Diplomarbeit, Fakultät für Informatik, Universität Ulm. Germany; (in German)
    • J. Ziegler, Ein verifiziertes Sicherheitsmodell für multiapplikative Smartcards, Diplomarbeit, Fakultät für Informatik, Universität Ulm. Germany, 2000 (in German).
    • (2000)
    • Ziegler, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.