Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Verified Formal Specification of A Secured Communication Method For Smart Card Applications

Full metadata record
DC Field Value Language
dc.contributor.author김동환-
dc.date.accessioned2023-04-27T15:40:24Z-
dc.date.available2023-04-27T15:40:24Z-
dc.date.issued2021-11-
dc.identifier.issn2465-9169-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/4217-
dc.description.abstractIn remote villages without access to modern IT technology, simple devices such as smartcards can be used to carry out business transactions. These devices typically store multiple business applications from multiple vendors. Although devices must prevent malicious or accidental security breaches among the applications, a secure communication channel between two applications from different vendors is often required. In this paper, first, we propose a method of establishing secure communication channels between applications in embedded operating systems that run on multi-applet smart cards. Second, we enforce the high assurance using an intransitive noninterference security policy. Thirdly, we formalize the method through the Z language and create the formal specification of the proposed secure system. Finally, we verify its correctness using Rushby's unwinding theorem.-
dc.format.extent16-
dc.language영어-
dc.language.isoENG-
dc.publisher적정기술학회-
dc.titleA Verified Formal Specification of A Secured Communication Method For Smart Card Applications-
dc.title.alternativeA Verified Formal Specification of A Secured Communication Method For Smart Card Applications-
dc.typeArticle-
dc.publisher.location대한민국-
dc.identifier.doi10.37675/jat.2021.7.2.172-
dc.identifier.bibliographicCitation적정기술학회지(Journal of Appropriate Technology), v.7, no.2, pp 172 - 187-
dc.citation.title적정기술학회지(Journal of Appropriate Technology)-
dc.citation.volume7-
dc.citation.number2-
dc.citation.startPage172-
dc.citation.endPage187-
dc.identifier.kciidART002897945-
dc.description.isOpenAccessY-
dc.subject.keywordAuthorFormal verification-
dc.subject.keywordAuthorHigh assurance embedded operating systems-
dc.subject.keywordAuthorIntransitive noninterference security policy-
dc.subject.keywordAuthorSecure communication channels-
dc.subject.keywordAuthorThe unwinding theorem-
dc.subject.keywordAuthorZ language-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information and Communication Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE