International audienceWe propose in this paper a formal framework based on the B method, that supports the development of secured smart card applications. Accordingly to the Common Criteria methodology, we focus on the formal definition and modelling of access control policies by means of dedicated B models expressing, on one hand, the access control rules, and, on the other hand, the dynamics of the system. These models are then weaved to produce a security kernel. From there, we propose a conformance relationship that aims at establishing whether a concrete representation of the system complies, at the security level, with the security kernel. This embraces both a well-defined notion of security conformance as well as traceability allowin...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
International audienceThis paper is about generating security tests from the Common Criteria express...
SecureMDD is a model-driven approach to develop security-critical systems. It uses a model that repr...
International audienceWe propose in this paper a formal framework based on the B method, that suppor...
International audienceWe propose a formal framework based on the B method, that supports the develop...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
International audienceThis paper is about generating security tests from the Common Criteria express...
Embedded devices like smartcards can now run multiple interact-ing applications. A particular challe...
Abstract: This paper is about generating security tests from the Common Criteria expression of a sec...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
Technical University Berlin is in the process of issuing smartcards to employees and students and pr...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
Abstract. Smart card Web server provides a modern interface between smart cards and the external wor...
Part 1: Smart Cards System SecurityInternational audienceSmart card Web server provides a modern int...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
International audienceThis paper is about generating security tests from the Common Criteria express...
SecureMDD is a model-driven approach to develop security-critical systems. It uses a model that repr...
International audienceWe propose in this paper a formal framework based on the B method, that suppor...
International audienceWe propose a formal framework based on the B method, that supports the develop...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
International audienceThis paper is about generating security tests from the Common Criteria express...
Embedded devices like smartcards can now run multiple interact-ing applications. A particular challe...
Abstract: This paper is about generating security tests from the Common Criteria expression of a sec...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
Technical University Berlin is in the process of issuing smartcards to employees and students and pr...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
Abstract. Smart card Web server provides a modern interface between smart cards and the external wor...
Part 1: Smart Cards System SecurityInternational audienceSmart card Web server provides a modern int...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
International audienceThis paper is about generating security tests from the Common Criteria express...
SecureMDD is a model-driven approach to develop security-critical systems. It uses a model that repr...