skip to main content
10.1145/1229285.1229316acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

An extended model of security policy for multi-applicative smart cards

Published:20 March 2007Publication History

ABSTRACT

The overall security level of applications running on a smart card is not only determined by the particular applications and by the operating system but also by external devices. All proposed security models of smart card operating systems assume the secure communication of applications on the card and the outside world, e.g. card readers, to be implemented by the applications themselves. In order to integrate external devices and external applications in a mandatory security policy, we extend the SMaCOS security model, which combines the secrecy model by Bell/LaPadula and the integrity model by Biba. Therefore, we introduce a modified execution access right and use integrity access categories to implement real world applications. As a case study, we give a signature creation application in combination with biometric user verification.

References

  1. Information Technology Security Evaluation Criteria (ITSEC), 1991.Google ScholarGoogle Scholar
  2. Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community Framework for Electronic Signatures, 1999.Google ScholarGoogle Scholar
  3. J. Andronick, B. Chatali, and O. Ly. Using Coq to verify Java Card applet isolation properties. In 16th International Conference on Theorem Proving in Higher Order Logics, no. 2758 in LNCS. Springer, 2003.Google ScholarGoogle Scholar
  4. D. Bell and L. LaPadula. Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, Bedford, Mass., 1976.Google ScholarGoogle ScholarCross RefCross Ref
  5. K. Biba. Integrity Considerations for Secure Computer Systems. Technical Report MTR-3153, Bedford, Mass., 1977.Google ScholarGoogle Scholar
  6. M. Brown. MULTOS version 4 on Hitachi AE45C integrated circuit card. Technical Report Certification Report No. P167, Cheltenham, UK, 2002.Google ScholarGoogle Scholar
  7. Protection Profile - Secure Signature-Creation Device, 2001. European Committee for Standardization.Google ScholarGoogle Scholar
  8. Common Criteria for Information Technology Security Evaluation (CC) V2.0, 1999.Google ScholarGoogle Scholar
  9. A. Karger, V. Austel, and D. Toll. Using a mandatory secrecy and integrity policy on smart cards and mobile devices. In (EUROSMART) Security Conference, pages 134--148, Marseille, France, 2000.Google ScholarGoogle Scholar
  10. A. Karger, V. Austel, and D. Toll. A new mandatory security policy combining secrecy and integrity. Technical Report RC 21717, T.J.Watson Research Center, Yorktown Heights, NY, 2000.Google ScholarGoogle Scholar
  11. G. Lassmann. Some results on robustness, security and usability of biometric systems. In IEEE International Conference on Multimedia and Expo, Lausanne, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  12. D. Maltoni, D. Maio, A. Jain, and S. Prabhaker. Handbook of Fingerprint Recognition. Springer-Verlag New York, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of artificial gummy fingers on fingerprint systems. In Proceedings of the SPIE, Optical Security and Counterfeit Deterrence Techniques IV, pages 275--289, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. Nanavati, M. Thieme, and R. Nanavati. Biometrics - Identity Verification in a Networked World. John Wiley & Sons New York, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. Schellhorn, W. Reif, A. Schairer, P. Karger, V. Austel, and D. Toll. Verification of a Formal Security Model for Multiapplicative Smart Cards. In Proceedings of the 6th European Symposium on Research in Computer Security, LNCS 1895, pages 17--36, Springer, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Scheuermann, S. Schwiderski-Grosche, and B. Struif. Usability of biometrics in relation to electronic signatures. Technical Report Report Nr. 118, GMD, 2000.Google ScholarGoogle Scholar
  17. L. Thalheim, J. Krissler, and P. Ziegler. Body check: Biometric access protection devices and their programs put to the test. c't - Magazin für Computertechnik, 10:114, 2002.Google ScholarGoogle Scholar
  18. U. Waldmann, D. Scheuermann, and C. Eckert. Protected transmission of biometric user authentication data for oncard-matching. In SAC '04: Proceedings of the 2004 ACM symposium on Applied computing, pages 425--430, New York, NY, USA, 2004. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An extended model of security policy for multi-applicative smart cards

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
        March 2007
        323 pages
        ISBN:1595935746
        DOI:10.1145/1229285

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 March 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        ASIACCS '07 Paper Acceptance Rate33of180submissions,18%Overall Acceptance Rate418of2,322submissions,18%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader