Learn More
This paper presents an approach enabling a smart card is-suer to verify that a new applet securely interacts with already down-loaded applets. A security policy has been deened that associates levels to applet attributes and methods and deenes authorized ows between levels. We propose a technique based on model checking to verify that actual information ows(More)
A complete and sound inference system, termed LUST-resolution (Linear resolution with Unrestricted Selection function based on Trees), allowing the use of arbitrary selection functions is presented. The inference system extends SL-resolution developed independently by Kowalski and Kuehner [3], by Reiter [7] and by Loveland [4] to permit any literal in a(More)
This paper presents some practical issues of a joint project between Gemplus and ONERA. In this approach, a smart card issuer can verify that a new applet securely interacts with already loaded applets. A security policy has been defined that associates levels to applet attributes and methods and defines authorized flows between levels. We propose a(More)
This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between levels. We propose a technique based on model checking to verify that actual information ows(More)
The paper describes the status of a joint project between Gemplus and ONERA Gemplus developed an electronic purse running on Java enabled smart cards The project goal is to verify security properties that should be enforced by the applets involved in this application A security policy has been de ned that associates levels to applet attributes and methods(More)
We present security extensions to the RTI prototype developed at ONERA (Office National d'Etudes et de Recherches Aérospatiales). These extensions are aimed at guaranteeing secure interoperation of simulations belonging to various mutually suspicious organizations. The paper describes the design of a security architecture for HLA/RTI and its implementation.(More)
This paper presents an approach enabling a smart card is suer to verify that a new applet securely interacts with already down loaded applets A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between levels We propose a technique based on model checking to verify that actual information ows(More)