Cited 0 time in
A Verified Formal Specification of A Secured Communication Method For Smart Card Applications
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | 김동환 | - |
| dc.date.accessioned | 2023-04-27T15:40:24Z | - |
| dc.date.available | 2023-04-27T15:40:24Z | - |
| dc.date.issued | 2021-11 | - |
| dc.identifier.issn | 2465-9169 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/4217 | - |
| dc.description.abstract | In remote villages without access to modern IT technology, simple devices such as smartcards can be used to carry out business transactions. These devices typically store multiple business applications from multiple vendors. Although devices must prevent malicious or accidental security breaches among the applications, a secure communication channel between two applications from different vendors is often required. In this paper, first, we propose a method of establishing secure communication channels between applications in embedded operating systems that run on multi-applet smart cards. Second, we enforce the high assurance using an intransitive noninterference security policy. Thirdly, we formalize the method through the Z language and create the formal specification of the proposed secure system. Finally, we verify its correctness using Rushby's unwinding theorem. | - |
| dc.format.extent | 16 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | 적정기술학회 | - |
| dc.title | A Verified Formal Specification of A Secured Communication Method For Smart Card Applications | - |
| dc.title.alternative | A Verified Formal Specification of A Secured Communication Method For Smart Card Applications | - |
| dc.type | Article | - |
| dc.publisher.location | 대한민국 | - |
| dc.identifier.doi | 10.37675/jat.2021.7.2.172 | - |
| dc.identifier.bibliographicCitation | 적정기술학회지(Journal of Appropriate Technology), v.7, no.2, pp 172 - 187 | - |
| dc.citation.title | 적정기술학회지(Journal of Appropriate Technology) | - |
| dc.citation.volume | 7 | - |
| dc.citation.number | 2 | - |
| dc.citation.startPage | 172 | - |
| dc.citation.endPage | 187 | - |
| dc.identifier.kciid | ART002897945 | - |
| dc.description.isOpenAccess | Y | - |
| dc.subject.keywordAuthor | Formal verification | - |
| dc.subject.keywordAuthor | High assurance embedded operating systems | - |
| dc.subject.keywordAuthor | Intransitive noninterference security policy | - |
| dc.subject.keywordAuthor | Secure communication channels | - |
| dc.subject.keywordAuthor | The unwinding theorem | - |
| dc.subject.keywordAuthor | Z language | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
