An Internet authorization scheme using smart-card-based security kernels

Y Deswarte, N Abghour, V Nicomette… - … Conference on Research …, 2001 - Springer
This paper presents an authorization scheme for applications distributed on the Internet with
two levels of access control: a global level, implemented through a fault-and intrusion …

[PDF][PDF] An intrusion-tolerant authorization scheme for internet applications

Y Deswarte, N Abghour, V Nicomette… - Proc. Int'l Conf …, 2002 - webhost.laas.fr
This paper presents an authorization scheme for applications distributed on the Internet with
two levels of access control: a global level, implemented through a faultand intrusion …

Secure internet smartcards

N Itoi, T Fukuzawa, P Honeyman - International Java Card Workshop, 2000 - Springer
Smartcards have traditionally been isolated from computer networks, communicating
exclusively with the host computers to which they are attached. As a result, users can only …

JCCap: capability-based access control for Java Card

D Hagimont, JJ Vandewalle - … and Advanced Applications: IFIP TC8/WG8 …, 2000 - Springer
This paper describes JCCap, a protection facility for cooperating applications in the context
of Java Card. It enables the control of access rights between mutually suspicious …

[PDF][PDF] Cross-domain one-shot authorization using smart cards

R Au, M Looi, P Ashley - Proceedings of the 7th ACM conference on …, 2000 - dl.acm.org
As the use of information technology is increasing rapidly in organizations around the world,
an important task is to design global networks with high security, efficiency and functionality …

Certifying an embedded remote method invocation protocol

J Andronick, QH Nguyen - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
This paper describes an approach to formally prove that an implementation of the Java Card
Remote Method Invocation protocol on smart cards fulfills its functional and security …

Java card: Internet computing on a smart card

SB Guthery - IEEE Internet Computing, 1997 - ieeexplore.ieee.org
The smart card-which offers Internet programmers a truly safe place to generate and store a
private encryption key-will soon be recognized as a useful component of Internet computing …

Securing e-business applications using smart cards

EM Hamann, H Henn, T Schack… - IBM Systems Journal, 2001 - ieeexplore.ieee.org
As the Internet is used increasingly as a platform for business transactions, security
becomes a primary issue for Internet applications. Some applications are too sensitive for …

Issues in smartcard middleware

R Kehr, M Rohs, H Vogt - International Java Card Workshop, 2000 - Springer
Integration of smartcards in distributed computing environments still suffers from the lack of
connectivity and processing power available on smartcards. A natural solution is the use of …

Implementing a formally verifiable security protocol in Java Card

E Hubbers, M Oostdijk, E Poll - … , Boppard, Germany, March 12-14, 2003 …, 2004 - Springer
This paper describes a case study in refining an abstract security protocol description down
to a concrete implementation on a Java Card smart card. The aim is to consider the …