2010
DOI: 10.1007/978-3-642-15257-3_15
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

Abstract: Abstract. Smart cards have been deployed as trusted components in a wide range of industries. The basis of the trust on a smart card platform and applications is static and evaluated before the card issuance to cardholders. A dynamic and post-issuance security assurance and validation mechanism can be useful, but it is not considered necessary in the Issuer Centric Smart Card Ownership Model. However, in an open and dynamic smart card environment like the User Centric Smart Card Ownership Model, it is essentia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 8 publications
(13 reference statements)
0
10
0
Order By: Relevance
“…The attestation handler implements the security-assurance and validation mechanism that certify to the requesting entity (e.g. Service Provider: SP) that the smart card's state is as it was at the time of a third party evaluation and stated by the evaluation certi cate [11]. An evaluation certi cate is a cryptographically signed certi cate issued by an evaluation body, and the respective card manufacturer places it on the platform.…”
Section: Trusted Environment and Execution Manager (Tem)mentioning
confidence: 99%
“…The attestation handler implements the security-assurance and validation mechanism that certify to the requesting entity (e.g. Service Provider: SP) that the smart card's state is as it was at the time of a third party evaluation and stated by the evaluation certi cate [11]. An evaluation certi cate is a cryptographically signed certi cate issued by an evaluation body, and the respective card manufacturer places it on the platform.…”
Section: Trusted Environment and Execution Manager (Tem)mentioning
confidence: 99%
“…limited scalability regarding the support for di erent application and platform scenarios, e) do not provide dynamic trust validation and assurance [56] and require an implicit trust, f ) do not require third party (security) evaluation, and g) do not provide user ownership/control (e.g. smart cards [32]).…”
Section: Aegis) C) Have Limited Application Execution Without User Cmentioning
confidence: 99%
“…It only gives the assurance that the smart card is secure against attacks as evaluated by the third party and stated in the issued certi cate [56], and that it is a state-of-the-art tamper-resistant device at the time of evaluation. Therefore, if the evaluation certi cate does not meet the SPs requirements or it out-dates the current attacker capability then the SP should decline the application lease.…”
Section: Simulator Attack Resiliencementioning
confidence: 99%
See 2 more Smart Citations