Electronic Purse Applet Certification
نویسندگان
چکیده
منابع مشابه
Electronic Purse Applet Certification ? ( Extended
The paper describes the status of a joint project between Gemplus and ONERA. Gemplus developed an electronic purse running on Java enabled smart cards. The project goal is to verify security properties that should be enforced by the applets involved in this application. A security policy has been defined that associates levels to applet attributes and methods and defines authorized flows betwee...
متن کاملElectronic Purse Applet Certification: extended abstract
The paper describes the status of a joint project between Gemplus and ONERA. Gemplus developed an electronic purse running on Java enabled smart cards. The project goal is to verify security properties that should be enforced by the applets involved in this application. A security policy has been deened that associates levels to applet attributes and methods and deenes authorized ows between le...
متن کاملElectronic Purse Applet Certiication: Extended Abstract
The paper describes the status of a joint project between Gemplus and ONERA. Gemplus developed an electronic purse running on Java enabled smart cards. The project goal is to verify security properties that should be enforced by the applets involved in this application. A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between le...
متن کاملElectronic Purse Applet Certi cation : extendedabstract 1
ion The logfull() byte code is modelled by an SMV [8] module that involves the following variables: pc: program counter; mem[i]: an array modelling the memory locations; stck[i]: an array modelling the operand stack; sP : stack pointer; ByteCode: the name of the current instruction. The values of the variables are abstracted into levels. Levels are de ned in a module called Levels in such a way...
متن کاملSecurity Modelling for Electronic Commerce: The Common Electronic Purse Specifications
Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Security critical systems are specified with extended structure diagrams, message sequence charts for the protocols and statecharts for the attacker, translated into an AUTOFOCUS system model and examined for security weakne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2000
ISSN: 1571-0661
DOI: 10.1016/s1571-0661(04)00092-1