A B formal framework for security developments in the domain of smart card applications

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We propose in this paper a formal framework based on the B method, that supports the development of secured smart card applications. Accordingly to the Common Criteria methodology, we focus on the formal definition and modelling of access control policies by means of dedicated B models expressing, on one hand, the access control rules, and, on the other hand, the dynamics of the system. These models are then weaved to produce a security kernel. From there, we propose a conformance relationship that aims at establishing whether a concrete representation of the system complies, at the security level, with the security kernel. This embraces both a well-defined notion of security conformance as well as traceability allowing to relate basic events appearing at the level of applications with abstract security policies. This approach is put in practice on an industrial case study in the context of the POSÉ project, involving both academic and industrial partners. © 2008 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Dadeau, F., Potet, M. L., & Tissot, R. (2008). A B formal framework for security developments in the domain of smart card applications. In IFIP International Federation for Information Processing (Vol. 278, pp. 141–155). Springer New York. https://doi.org/10.1007/978-0-387-09699-5_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free