2008
DOI: 10.1145/1341312.1341320
|View full text |Cite
|
Sign up to set email alerts
|

The Caernarvon secure embedded operating system

Abstract: The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has been designed to be evaluated under the Common Criteria at EAL7, the highest defined level of assurance. Historically, smart card processors have not supported the hardware protection features necessary to separate the OS from the applications, and one application from another. The Caernarvon OS has taken advantage of the fir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…To ensure that the UCOM is a reliable, secure and efficient model, it is necessary that smart cards and their applications should provide assurance along with validation of the implemented security mechanisms to the requesting entities. Similar mechanisms are mentioned in literature [6][7][8], but their focus is on the ICOM. Although, the primary focus of this paper is on a framework that satisfies the UCOM requirements, we consider that the framework could be equally valid in the ICOM environment.…”
Section: Introductionmentioning
confidence: 78%
See 1 more Smart Citation
“…To ensure that the UCOM is a reliable, secure and efficient model, it is necessary that smart cards and their applications should provide assurance along with validation of the implemented security mechanisms to the requesting entities. Similar mechanisms are mentioned in literature [6][7][8], but their focus is on the ICOM. Although, the primary focus of this paper is on a framework that satisfies the UCOM requirements, we consider that the framework could be equally valid in the ICOM environment.…”
Section: Introductionmentioning
confidence: 78%
“…Some reservations are expressed in the literature regarding the validity and the process efficiency of the CC [7,12,13]. However, the CC has taken a strong hold in the smart card industry, especially in high security smart cards like banking and IDS/passports etc, as a security evaluation-standard of choice.…”
Section: Why Common Criteria?mentioning
confidence: 99%
“…We can also use the Caernarvon operating system demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has been designed to be evaluated under the Common Criteria at EAL7 [6].The processor must also be implemented for the functioning of the Computerized Pen Drive. We use the Nurture IDR segmentation and multiple instructions queues in superscalar pipelining processor [7], which is very fast and the efficient processor.…”
Section: E Operating Systemmentioning
confidence: 99%
“…We can also use the Caernarvon operating system demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has been designed to be evaluated under the Common Criteria at EAL7 [7].The processor must also be implemented for the functioning of the Computerized Pen Drive. We use the Nurture IDR segmentation and multiple instructions queues in superscalar pipelining processor [8], which is very fast and the efficient processor.…”
Section: Operating Systemmentioning
confidence: 99%