Implementing a Formally Verifiable Security Protocol in Java Card
نویسندگان
چکیده
This paper describes a case study in refining an abstract security protocol description down to a concrete implementation on a Java Card smart card. The aim is to consider the decisions that have to be made in the development of such an implementation in a systematic way, and to investigate the possibilities of formal specification and verification in the design process and for the final implementation.
منابع مشابه
JavaSPI: A Framework for Security Protocol Implementation
This paper presents JavaSPI, a “model-driven” development framework that allows the user to reliably develop security protocol implementations in Java, starting from abstract models that can be verified formally. The main novelty of this approach stands in the use of Java as both a modeling language and the implementation language. The JavaSPI framework is validated by implementing a scenario o...
متن کاملAn Operational Semantics of the Java Card Firewall
This paper presents an operational semantics for a subset of Java Card bytecode, focussing on aspects of the Java Card firewall, method invocation, field access, variable access, shareable objects and contexts. The goal is to provide a precise description of the Java Card firewall using standard tools from operational semantics. Such a description is necessary for formally arguing the correctne...
متن کاملDesign and implementation of a novel secure internet voting protocol using Java Card 3 technology
Internet voting is highly regarded for its speed, automatic counting, cost reduction and lower possibility of error. However, in order to replace traditional voting system with internet-voting, i-voting must meet many requirements and overcome some challenges like collusion, uncoercibility, unfairness and in particular voter insecure platforms. In this paper, we propose a very practical and sec...
متن کاملMutual Authentication with Smart Cards
The World Wide Web has become the de facto interface for consumer oriented electronic commerce. So far the interaction between consumers and merchants is mostly limited to providing information about products and credit card based payments for mail orders. This is largely due to the lack of security currently available for commercial transactions. At the moment the only security mechanism prese...
متن کاملA new secure Internet voting protocol using Java Card 3 technology and Java information flow concept
Recently, there has been a spate of interest in Internet voting systems because of advantages such as participation, efficiency, accuracy, and transparency. However, challenges for having a secure i-voting system are considerable. Unless these systems are designed and implemented carefully, citizens might lose their trust on the whole voting process. This paper introduces a novel online voting ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003