Service interruption on Monday 11 July from 12:30 to 13:00: all the sites of the CCSD (HAL, EpiSciences, SciencesConf, AureHAL) will be inaccessible (network hardware connection).
Skip to Main content Skip to Navigation
Conference papers

Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?

Abstract : Java card technology have progressed at the point of running web servers and web clients on a smart card. Yet concrete deployment of multi-applications smart cards have remained extremely rare because the business model of the asynchronous download and update of appli- cations by di erent parties requires the control of interactions among possible applications after the card has been elded. Yet the current se- curity models and techniques do not support this type of evolution. We propose in this paper to apply the notion of security-by-contract (S C), that is a speci cation of the security behavior of an application that must be compliant with the security policy of the hosting platform. This compliance can be checked at load time and in this way avoid the need for costly run-time monitoring. We show how the S C approach can be used to prevent illegal information exchange among several applications on a single smart card platform, and to deal with dynamic changes in both contracts and platform policy.
Document type :
Conference papers
Complete list of metadata

Cited literature [17 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Friday, August 29, 2014 - 2:03:08 PM
Last modification on : Saturday, June 8, 2019 - 2:14:02 PM
Long-term archiving on: : Sunday, November 30, 2014 - 10:41:39 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci. Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?. 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩. ⟨hal-01059143⟩



Record views


Files downloads