Enforcing high-level security properties for applets

13Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Smart card applications often handle privacy-sensitive information, and therefore must obey certain security policies. Typically, such policies are described as high-level security properties, stating for example that no pin verification must take place within a transaction. Behavioural interface specification languages, such as JML (Java Modeling Language), have been successfully used to validate functional properties of smart card applications. However, high-level security properties cannot directly be expressed in such languages. Therefore, this paper proposes a method to translate high-level security properties into JML annotations. The method synthesises appropriate annotations and weaves them throughout the application. In this way, security policies can be validated using existing tools for JML. The method is general and applies to a large class of security properties. To validate the method, it has been applied to several realistic examples of smart card applications. This allowed us to find violations against the documented security policies for some of these applications. © 2004 Springer Science + Business Media, Inc.

Cite

CITATION STYLE

APA

Pavlova, M., Barthe, G., Burdy, L., Huisman, M., & Lanet, J. L. (2004). Enforcing high-level security properties for applets. In IFIP Advances in Information and Communication Technology (Vol. 153, pp. 1–16). Springer New York LLC. https://doi.org/10.1007/1-4020-8147-2_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free