Certification of programs for secure information flow
Communications of the ACM
Compile-Time Detection of Information Flow in Sequential Programs
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Rules for Designing Multilevel Object-Oriented Databases
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Byte Code Verification for Java Smart Card Based on Model Checking
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Formal Techniques for an ITSEC-E4 Secure Gateway
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines
VMCAI '02 Revised Papers from the Third International Workshop on Verification, Model Checking, and Abstract Interpretation
Context Inference for Static Analysis of Java Card Object Sharing
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
CardS4: Modal Theorem Proving on Java Smartcards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow
JavaCard '00 Revised Papers from the First International Workshop on Java on Smart Cards: Programming and Security
CardKt: Automated Multi-modal Deduction on Java Cards for Multi-application Security
JavaCard '00 Revised Papers from the First International Workshop on Java on Smart Cards: Programming and Security
Checking secure interactions of smart card applets: extended version
Journal of Computer Security - Special issue on ESORICS 2000
On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Can we support applications' evolution in multi-application smart cards by security-by-contract?
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Firewall mechanism in a user centric smart card ownership model
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Load time security verification
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Java card architecture for autonomous yet secure evolution of smart cards applications
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
JCSI: A tool for checking secure information flow in Java Card applications
Journal of Systems and Software
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Load time code validation for mobile phone Java Cards
Journal of Information Security and Applications
Hi-index | 0.00 |
In this paper, we aim to clarify some issues regarding the deployment context of multiapplicative smart cards. We especially deal with the trust relationships between the involved parties and the resulting constraints from a security point of view. We highlight a new security threat in a multiapplicative context and propose a new multilevel security model which allows to control precisely the information flows inside the card, and to detect illegal data sharing. Finally we illustrate all the proposed concepts on an multiapplicative example involving three applications.