Biometrics: Identity Verification in a Networked World
Biometrics: Identity Verification in a Networked World
Verification of a Formal Security Model for Multiapplicative Smart Cards
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Protected transmission of biometric user authentication data for oncard-matching
Proceedings of the 2004 ACM symposium on Applied computing
Hi-index | 0.00 |
The overall security level of applications running on a smart card is not only determined by the particular applications and by the operating system but also by external devices. All proposed security models of smart card operating systems assume the secure communication of applications on the card and the outside world, e.g. card readers, to be implemented by the applications themselves. In order to integrate external devices and external applications in a mandatory security policy, we extend the SMaCOS security model, which combines the secrecy model by Bell/LaPadula and the integrity model by Biba. Therefore, we introduce a modified execution access right and use integrity access categories to implement real world applications. As a case study, we give a signature creation application in combination with biometric user verification.