Authenticating mandatory access controls and preserving privacy for a high-assurance smart card

被引:0
|
作者
Scherzer, H
Canetti, R
Karger, PA
Krawczyk, H
Rabin, T
Toll, DC
机构
[1] IBM Deutschland GmbH, Secure Syst & Smart Cards, D-71032 Boblingen, Germany
[2] IBM Res Div, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[3] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents an authentication protocol for high-assurance smart card operating systems that support download of mutually suspicious applications. Such a protocol is required to be part of the operating system, rather than the traditional smart card approach of allowing applications to do authentication, because strong authentication is essential for the operating system to protect one application from another. The protocol itself is based on the existing IKE protocol [13], used for authentication in IPSEC. What is new is the integration of an IKE-like protocol with authentication of mandatory secrecy and integrity access controls, the recognition that a single PKI-hierarchy cannot certify identity and all possible mandatory access rights, and the use of IKE to resolve privacy problems found in existing smart card authentication protocols.
引用
收藏
页码:181 / 200
页数:20
相关论文
共 35 条
  • [1] Implementing a High-Assurance Smart-Card OS
    Karger, Paul A.
    Toll, David C.
    Palmer, Elaine R.
    McIntosh, Suzanne K.
    Weber, Samuel
    Edwards, Jonathan W.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 51 - +
  • [2] A Comprehensively Secure Smart card access controls
    Alazmi, Sulaiman
    Khan, Ahmad Raza
    Yu, Qian
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [3] Access and integrity control in a public-access, high-assurance configuration management system
    Shapiro, JS
    Vanderburgh, J
    USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 109 - 120
  • [4] A Card Requirements Language Enabling Privacy-Preserving Access Control
    Camenisch, Jan
    Moedersheim, Sebastian
    Neven, Gregory
    Preiss, Franz-Stefan
    Sommer, Dieter
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 119 - 128
  • [5] High-Assurance Smart Grid: A Three-Part Model for Smart Grid Control Systems
    Overman, Thomas M.
    Sackman, Ronald W.
    Davis, Terry L.
    Cohen, Brad S.
    PROCEEDINGS OF THE IEEE, 2011, 99 (06) : 1046 - 1062
  • [6] A smart-card-enabled privacy preserving e-prescription system
    Yang, YJ
    Han, XX
    Bao, F
    Deng, RH
    IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2004, 8 (01): : 47 - 58
  • [7] Secure and Privacy Preserving RFID Based Access Control to Smart Buildings
    Al-Sudani, Ahmed Raad
    Gao, Shang
    Wen, Sheng
    Al-Khiza'ay, Muhmmad
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 146 - 155
  • [8] Privacy-preserving attribute ticket scheme based on mobile terminal with smart card
    Shi R.
    Feng H.
    Xie H.
    Shi G.
    Liu B.
    Yang Y.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (10): : 26 - 41
  • [9] A differential privacy-based privacy-preserving data publishing algorithm for transit smart card data
    Li, Yang
    Yang, Dasen
    Hu, Xianbiao
    TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2020, 115
  • [10] An Access Control Scheme With Privacy-Preserving Authentication and Flexible Revocation for Smart Healthcare
    Liang, Xiyu
    Liu, Yali
    Ning, Jianting
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2024, 28 (06) : 3269 - 3278