We present a method for proving representation correspondences in the Common Criteria (CC) certification of smart-card applications. For security policy enforcement, the CC defines a chain of requirements: a security policy model (SPM), a functional specification (FSP), and a target-of-evaluation design (TDS). In our approach to the CC certification, these requirements are models of applications that can have different representations. A representation correspondence (RCR) describes a correlation between the representations of two adjacent requirements. One task in the CC certification is to demonstrate formal proofs of RCRs. We first develop a modelling framework by which the representations of SPM, FSP and TDS can be described unifor...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
International audienceWe propose a formal framework based on the B method, that supports the develop...
Despite the increased use of smartcards in many areas of everyday life the secure interoperability o...
International audienceWe propose in this paper a formal framework based on the B method, that suppor...
International audienceThis paper is about generating security tests from the Common Criteria express...
Formally verifying a product in an early phase of the design process has several advantages. First, ...
Smartcards are used in a wide range of applications including electronic (e-) driving licenses, e-id...
Abstract: This paper is about generating security tests from the Common Criteria expression of a sec...
In the next years, smart cards are going to become the main personal identification document in many...
Manufacturers and producers of smart card systems are all beginning to climb on the certification ba...
International audienceThis paper is about generating security tests from the Common Criteria express...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
International audienceWe propose a formal framework based on the B method, that supports the develop...
Despite the increased use of smartcards in many areas of everyday life the secure interoperability o...
International audienceWe propose in this paper a formal framework based on the B method, that suppor...
International audienceThis paper is about generating security tests from the Common Criteria express...
Formally verifying a product in an early phase of the design process has several advantages. First, ...
Smartcards are used in a wide range of applications including electronic (e-) driving licenses, e-id...
Abstract: This paper is about generating security tests from the Common Criteria expression of a sec...
In the next years, smart cards are going to become the main personal identification document in many...
Manufacturers and producers of smart card systems are all beginning to climb on the certification ba...
International audienceThis paper is about generating security tests from the Common Criteria express...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
We present a formal model for security protocols of smart card applications using Abstract State Mac...