Verified formal security models for multiapplicative smart cards

  • Authors:
  • Gerhard Schellhorn;Wolfgang Reif;Axel Schairer;Paul Karger;Vernon Austel;David Toll

  • Affiliations:
  • Universität Augsburg, Lehrstuhl für Softwaretechnik und Programmiersprachen, D-86135 Augsburg, Germany;Universität Augsburg, Lehrstuhl für Softwaretechnik und Programmiersprachen, D-86135 Augsburg, Germany;DFKI GmbH, Stuhlsatzenhausweg 3, D-66123 Saarbrücken, Germany;IBM T.J. Watson Research Center, 30 Saw Mill River Rd., Hawthorne, NY;IBM T.J. Watson Research Center, 30 Saw Mill River Rd., Hawthorne, NY;IBM T.J. Watson Research Center, 30 Saw Mill River Rd., Hawthorne, NY

  • Venue:
  • Journal of Computer Security - Special issue on ESORICS 2000
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the main security aspects of secrecy, integrity, secure communication between applications and secure downloading of new applications. The first model is as abstract as possible, whereas the second extends the first by adding practically relevant issues such as a structured file system. The models satisfy a common security policy consisting of authentication and intransitive noninterference. The policy extends the classical security policy of Bell/LaPadula and Biba models, but avoids the need for trusted processes that are allowed to circumvent the security policy. Instead trusted processes are incorporated directly in the model itself and are subject to the security policy. The security policy has been formally proven to be correct for both models.