메뉴 건너뛰기




Volumn 2808, Issue , 2003, Pages 181-200

Authenticating mandatory access controls and preserving privacy for a high-assurance smart card

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 0142157011     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39650-5_11     Document Type: Conference Paper
Times cited : (10)

References (33)
  • 1
    • 35048856922 scopus 로고    scopus 로고
    • Validation of elliptic curve public keys
    • In Yvo G. Desmedt, editor, Miami, FL, Springer Verlag
    • Adrian Antipa, Daniel Brown, Alfred Menezes, René Struik, and Scott Vanstone. Validation of elliptic curve public keys. In Yvo G. Desmedt, editor, Public Key Cryptography – PKC 2003, volume 2567, pages 211–223, Miami, FL, 2003. Springer Verlag.
    • (2003) Public Key Cryptography – PKC 2003 , vol.2567 , pp. 211-223
    • Antipa, A.1    Brown, D.2    Menezes, A.3    Struik, R.4    Vanstone, S.5
  • 2
    • 85165846303 scopus 로고    scopus 로고
    • Part 1 - Basic requirements
    • Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 7 May
    • Application interface for smartcards used as secure signature creation devices: Part 1 - basic requirements. Technical Report CEN/ISSS WS/E-Sign Draft CWA Group K Version 1.05, Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 7 May 2003.
    • (2003) Technical Report CEN/ISSS Ws/E-Sign Draft CWA Group K Version 1.05
  • 3
    • 0003400251 scopus 로고
    • Computer security model: Unified exposition and multics interpretation
    • Bedford, MA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA, June
    • David E. Bell and Leonard J. LaPadula. Computer security model: Unified exposition and multics interpretation. Technical Report ESD–TR–75–306, The MITRE Corporation, Bedford, MA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA, June 1975. http://csrc.nist.gov/publications/history/bell76.pdf.
    • (1975) Technical Report ESD–TR–75–306, the MITRE Corporation
    • Bell, D.E.1    Lapadula, L.J.2
  • 4
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Bedford, MA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA, April
    • Kenneth J. Biba. Integrity considerations for secure computer systems. Technical Report ESD–TR–76–372, The MITRE Corporation, Bedford, MA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA, April 1977.
    • (1977) Technical Report ESD–TR–76–372, the MITRE Corporation
    • Biba, K.J.1
  • 6
    • 85165865801 scopus 로고    scopus 로고
    • Application interface
    • Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 15 December
    • Chipcards with digital signature application/function according to SigG and SigV - part 1: Application interface. Technical Report DIN V66291-1, Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 15 December 1998.
    • (1998) Technical Report DIN V66291-1
  • 7
    • 85165844192 scopus 로고    scopus 로고
    • Basic security services
    • Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 17 October
    • Chipcards with digital signature application/function according to SigG and SigV - part 4: Basic security services. Technical Report DIN V66291-4, Secretariat: DIN Deutsches Institut für Normung e.V, Berlin, 17 October 2000.
    • (2000) Technical Report DIN V66291-4
  • 8
    • 85165836726 scopus 로고
    • Joint Interoperability and Engineering Organization (JIEO), Fort Monmouth, NJ, 25 January
    • Common security label (CSL). Technical Report MIL-STD-2045-48501, Joint Interoperability and Engineering Organization (JIEO), Fort Monmouth, NJ, 25 January 1995.
    • (1995) Technical Report MIL-STD-2045-48501
  • 10
    • 84867101962 scopus 로고
    • Washington, DC, USA. Department of Defense Trusted Computer System Evaluation Criteria, December
    • DOD 5200.28-STD, Department of Defense, Washington, DC, USA. Department of Defense Trusted Computer System Evaluation Criteria, December 1985. http://csrc.nist.gov/publications/history/dod85.pdf.
    • (1985) Department of Defense
  • 11
    • 34250726454 scopus 로고
    • The story of non-secret encryption
    • Communications- Electronics Security Group (CESG), Cheltenham, UK
    • J. H. Ellis. The story of non-secret encryption. Technical report, Communications- Electronics Security Group (CESG), Cheltenham, UK, 1987. http://www.cesg.gov.uk/publications/media/nsecret/ellis.pdf.
    • (1987) Technical Report
    • Ellis, J.H.1
  • 12
    • 85094816321 scopus 로고    scopus 로고
    • Which security policy for multiapplication smart cards?
    • Chicago, IL, The USENIX Association
    • Pierre Girard. Which security policy for multiapplication smart cards? In Proceedings of the USENIX Workshop on Smartcard Technology, pages 21–28, Chicago, IL, 1999. The USENIX Association.
    • (1999) Proceedings of the USENIX Workshop on Smartcard Technology , pp. 21-28
    • Girard, P.1
  • 13
    • 0004115841 scopus 로고    scopus 로고
    • The internet key exchange (IKE)
    • November
    • D. Harkins and D. Carrel. The internet key exchange (IKE). Technical Report RFC2409, November 1998. ftp://ftp.rfc-editor.org/in-notes/rfc2409.txt.
    • (1998) Technical Report RFC2409
    • Harkins, D.1    Carrel, D.2
  • 14
    • 85165850202 scopus 로고    scopus 로고
    • Part 3: Electronic signals and transmission protocols
    • 1997(E), International Organization for Standardization, Genève, 18 September
    • Information technology - identification cards - integrated circuit(s) cards with contacts- part 3: Electronic signals and transmission protocols. Technical Report ISO/IEC 7816-3:1997(E), International Organization for Standardization, Genève, 18 September 1997.
    • (1997) Technical Report ISO/IEC 7816-3
  • 15
    • 85165845713 scopus 로고
    • Part 4: Inter-industry commands for interchange
    • International Standards Organization, Genève
    • Information technology - identification cards - integrated circuit(s) cards with contacts - part 4: Inter-industry commands for interchange. Technical Report ISO/IEC 7816-4, International Standards Organization, Genève, 1995.
    • (1995) Technical Report ISO/IEC 7816-4
  • 16
    • 85165865032 scopus 로고    scopus 로고
    • Part 15: Cryptographic information application
    • International Organization for Standardization, Genève
    • Information technology - identification cards - integrated circuit(s) cards with contacts - part 15: Cryptographic information application. Technical Report ISO/IEC CD 7816-15, draft edition, International Organization for Standardization, Genève, 2001.
    • (2001) Technical Report ISO/IEC CD 7816-15, Draft Edition
  • 17
    • 85165841528 scopus 로고    scopus 로고
    • Security techniques – evaluation criteria for it security – parts 1, 2, and 3
    • International Organization for Standardization, Genève
    • Information technology - security techniques – evaluation criteria for it security – parts 1, 2, and 3. Technical Report ISO/IEC 15408-1, -2, and -3, International Organization for Standardization, Genève, 1999.
    • (1999) Technical Report ISO/IEC 15408-1, -2, and -3
  • 18
    • 84892771875 scopus 로고    scopus 로고
    • Mechanisms using digital signature techniques
    • International Organization for Standardization, Genève, 15 October
    • Information technology - security techniques - entity authentication - part 3: Mechanisms using digital signature techniques. Technical Report ISO/IEC 9798-3, International Organization for Standardization, Genève, 15 October 1998.
    • (1998) Technical Report ISO/IEC 9798-3
  • 19
    • 85165860708 scopus 로고    scopus 로고
    • Mechanisms using asymetric techniques
    • International Organization for Standardization, Genève, 1 November
    • Information technology - security techniques - key management - part 3: Mechanisms using asymetric techniques. Technical Report ISO/IEC 11770-3, International Organization for Standardization, Genève, 1 November 1999.
    • (1999) Technical Report ISO/IEC 11770-3
  • 20
    • 0018155334 scopus 로고
    • The lattice security model in a public computing network
    • Washington, DC, USA, 4–6 December, Association for Computing Machinery
    • Paul A. Karger. The lattice security model in a public computing network. In ACM 78: Proceedings 1978 Annual Conference, volume 1, pages 453–459, Washington, DC, USA, 4–6 December 1978. Association for Computing Machinery.
    • (1978) ACM 78: Proceedings 1978 Annual Conference , vol.1 , pp. 453-459
    • Karger, P.A.1
  • 21
    • 77952286492 scopus 로고    scopus 로고
    • Multi-organizational mandatory access controls for commercial applications
    • Thomas J. Watson Research Center, Yorktown Heights, NY, 22 February
    • Paul A. Karger. Multi-organizational mandatory access controls for commercial applications. Technical Report RC 21673 (97655), IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, 22 February 2000. http://domino.watson.ibm.com/library/CyberDig.nsf/home.
    • (2000) Technical Report RC 21673 (97655), IBM Research Division
    • Karger, P.A.1
  • 22
    • 0011272226 scopus 로고    scopus 로고
    • A new mandatory security policy combining secrecy and integrity
    • Thomas J. Watson Research Center, Yorktown Heights, NY, 15 March
    • Paul A. Karger, Vernon R. Austel, and David C. Toll. A new mandatory security policy combining secrecy and integrity. Technical Report RC 21717 (97406), IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, 15 March 2000. http://domino.watson.ibm.com/library/CyberDig.nsf/home.
    • (2000) Technical Report RC 21717 (97406), IBM Research Division
    • Karger, P.A.1    Austel, V.R.2    Toll, D.C.3
  • 23
    • 33644484966 scopus 로고    scopus 로고
    • Using a mandatory secrecy and integrity policy on smart cards and mobile devices
    • Marseilles, France, 13–15 June
    • Paul A. Karger, Vernon R. Austel, and David C. Toll. Using a mandatory secrecy and integrity policy on smart cards and mobile devices. In EUROSMART Security Conference, pages 134–148, Marseilles, France, 13–15 June 2000.
    • (2000) EUROSMART Security Conference , pp. 134-148
    • Karger, P.A.1    Austel, V.R.2    Toll, D.C.3
  • 24
    • 84956989246 scopus 로고    scopus 로고
    • Using mandatory secrecy and integrity for business to business applications on mobile devices
    • Monterey, CA, 25-27 September, published on CD-ROM
    • Paul A. Karger, Vernon R. Austel, and David C. Toll. Using mandatory secrecy and integrity for business to business applications on mobile devices. In Workshop on Innovations in Strong Access Control, Naval Postgraduate School, Monterey, CA, 25-27 September 2000. published on CD-ROM. http://www.acsac.org/sac-tac/wisac00/wed0830.karger.pdf.
    • (2000) Workshop on Innovations in Strong Access Control, Naval Postgraduate School
    • Karger, P.A.1    Austel, V.R.2    Toll, D.C.3
  • 25
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The’SIGn-and-MAc’ approach to authenticated diffiehellman and its use in the IKE protocols
    • D. Boneh, editor, Santa Barbara, CA, 17-21 August, Springer–Verlag
    • Hugo Krawczyk. SIGMA: the’SIGn-and-MAc’ approach to authenticated diffiehellman and its use in the IKE protocols. In D. Boneh, editor, Advances in Cryptology – CRYPTO 2003 Proceesings, volume 2729 of Lecture Notes in Computer Science, pages 399–424, Santa Barbara, CA, 17-21 August 2003. Springer–Verlag.
    • (2003) Advances in Cryptology – CRYPTO 2003 Proceesings, Volume 2729 of Lecture Notes in Computer Science , pp. 399-424
    • Krawczyk, H.1
  • 26
    • 0003729341 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • February
    • Hugo Krawczyk, M. Bellare, and Ran Canetti. HMAC: keyed-hashing for message authentication. Technical Report RFC-2104, February 1997. http://www.faqs.org/ftp/rfc/rfc2104.txt.
    • (1997) Technical Report RFC-2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 27
    • 84958601057 scopus 로고    scopus 로고
    • A key recovery attack on discrete log-based schemes using a prime order subgroup
    • In Burton S. Kaliski, editor, Santa Barbara, CA, Springer Verlag
    • Chae Hoon Lim and Pil Joong Lee. A key recovery attack on discrete log-based schemes using a prime order subgroup. In Burton S. Kaliski, editor, Advances in Cryptology - CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 249–263, Santa Barbara, CA, 1997. Springer Verlag.
    • (1997) Advances in Cryptology - CRYPTO’97, Volume 1294 of Lecture Notes in Computer Science , pp. 249-263
    • Lim, C.H.1    Lee, P.J.2
  • 28
    • 68249131357 scopus 로고    scopus 로고
    • Key agreement and key transport using elliptic curve cryptography
    • American National Standards Institute (ANSI)
    • Public key cryptography for the financial services industry, key agreement and key transport using elliptic curve cryptography. Technical Report X9.63-2001, American National Standards Institute (ANSI), 2001.
    • (2001) Technical Report X9.63-2001
  • 30
    • 85165842362 scopus 로고
    • National Institute of Standards and Technology, Gaithersburg, MD, 6 September
    • Standard security label for information transfer. Technical Report FIPS PUB 188, National Institute of Standards and Technology, Gaithersburg, MD, 6 September 1994.
    • (1994) Technical Report FIPS PUB 188
  • 31
    • 2442558738 scopus 로고
    • Computer security requirements – guidance for applying the department of defense trusted computer system evaluation criteria in specific environments
    • DoD Computer Security Center, Fort George G. Meade, MD, 25 June
    • Technical rationale behind CSC-STD-003-85: Computer security requirements – guidance for applying the department of defense trusted computer system evaluation criteria in specific environments. Technical Report CSC-STD-004-85, DoD Computer Security Center, Fort George G. Meade, MD, 25 June 1985.
    • (1985) Technical Report CSC-STD-004-85
  • 32
    • 85165857868 scopus 로고    scopus 로고
    • Kommentare zu application interface for smart cards used as secure signature creation devices, part 1 - Basic requirements version 0.14 28th february 2003 (in German)
    • Bonn, Germany, 14 March
    • Andreas Wiemers. Kommentare zu application interface for smart cards used as secure signature creation devices, part 1 - basic requirements version 0.14 28th february 2003 (in German). Technical report, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 14 March 2003.
    • (2003) Technical Report, Bundesamt für Sicherheit in Der Informationstechnik (BSI)
    • Wiemers, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.