An Internet authorization scheme using smart-card-based security kernels
Y Deswarte, N Abghour, V Nicomette… - … Conference on Research …, 2001 - Springer
This paper presents an authorization scheme for applications distributed on the Internet with
two levels of access control: a global level, implemented through a fault-and intrusion …
two levels of access control: a global level, implemented through a fault-and intrusion …
[PDF][PDF] An intrusion-tolerant authorization scheme for internet applications
Y Deswarte, N Abghour, V Nicomette… - Proc. Int'l Conf …, 2002 - webhost.laas.fr
This paper presents an authorization scheme for applications distributed on the Internet with
two levels of access control: a global level, implemented through a faultand intrusion …
two levels of access control: a global level, implemented through a faultand intrusion …
Secure internet smartcards
N Itoi, T Fukuzawa, P Honeyman - International Java Card Workshop, 2000 - Springer
Smartcards have traditionally been isolated from computer networks, communicating
exclusively with the host computers to which they are attached. As a result, users can only …
exclusively with the host computers to which they are attached. As a result, users can only …
JCCap: capability-based access control for Java Card
D Hagimont, JJ Vandewalle - … and Advanced Applications: IFIP TC8/WG8 …, 2000 - Springer
This paper describes JCCap, a protection facility for cooperating applications in the context
of Java Card. It enables the control of access rights between mutually suspicious …
of Java Card. It enables the control of access rights between mutually suspicious …
[PDF][PDF] Cross-domain one-shot authorization using smart cards
R Au, M Looi, P Ashley - Proceedings of the 7th ACM conference on …, 2000 - dl.acm.org
As the use of information technology is increasing rapidly in organizations around the world,
an important task is to design global networks with high security, efficiency and functionality …
an important task is to design global networks with high security, efficiency and functionality …
Certifying an embedded remote method invocation protocol
J Andronick, QH Nguyen - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
This paper describes an approach to formally prove that an implementation of the Java Card
Remote Method Invocation protocol on smart cards fulfills its functional and security …
Remote Method Invocation protocol on smart cards fulfills its functional and security …
Java card: Internet computing on a smart card
SB Guthery - IEEE Internet Computing, 1997 - ieeexplore.ieee.org
The smart card-which offers Internet programmers a truly safe place to generate and store a
private encryption key-will soon be recognized as a useful component of Internet computing …
private encryption key-will soon be recognized as a useful component of Internet computing …
Securing e-business applications using smart cards
EM Hamann, H Henn, T Schack… - IBM Systems Journal, 2001 - ieeexplore.ieee.org
As the Internet is used increasingly as a platform for business transactions, security
becomes a primary issue for Internet applications. Some applications are too sensitive for …
becomes a primary issue for Internet applications. Some applications are too sensitive for …
Issues in smartcard middleware
R Kehr, M Rohs, H Vogt - International Java Card Workshop, 2000 - Springer
Integration of smartcards in distributed computing environments still suffers from the lack of
connectivity and processing power available on smartcards. A natural solution is the use of …
connectivity and processing power available on smartcards. A natural solution is the use of …
Implementing a formally verifiable security protocol in Java Card
This paper describes a case study in refining an abstract security protocol description down
to a concrete implementation on a Java Card smart card. The aim is to consider the …
to a concrete implementation on a Java Card smart card. The aim is to consider the …