Authenticating mandatory access controls and preserving privacy for a high-assurance smart card

10Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper presents an authentication protocol for highassurance smart card operating systems that support download of mutually suspicious applications. Such a protocol is required to be part of the operating system, rather than the traditional smart card approach of allowing applications to do authentication, because strong authentication is essential for the operating system to protect one application from another. The protocol itself is based on the existing IKE protocol [13], used for authentication in IPSEC. What is new is the integration of an IKE-like protocol with authentication of mandatory secrecy and integrity access controls, the recognition that a single PKI-hierarchy cannot certify identity and all possible mandatory access rights, and the use of IKE to resolve privacy problems found in existing smart card authentication protocols.

Cite

CITATION STYLE

APA

Scherzer, H., Canetti, R., Karger, P. A., Krawczyk, H., Rabin, T., & Toll, D. C. (2003). Authenticating mandatory access controls and preserving privacy for a high-assurance smart card. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2808, pp. 181–200). Springer Verlag. https://doi.org/10.1007/978-3-540-39650-5_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free