TY - GEN
T1 - Controlling application interactions on the novel smart cards with security-by-contract
AU - Gadyatskaya, O.
AU - Massacci, F.
PY - 2013
Y1 - 2013
N2 - In this paper we investigate novel use cases for open multi-application smart card platforms. These use cases require a fine-grained access control mechanism to protect the sensitive functionality of on-card applications. We overview the Security-by-Contract approach that validates at load time that the application code respects the interaction policies of other applications already on the card, and discuss how this approach can be used to address the challenging change scenarios in the target use cases. © 2013 Springer-Verlag.
AB - In this paper we investigate novel use cases for open multi-application smart card platforms. These use cases require a fine-grained access control mechanism to protect the sensitive functionality of on-card applications. We overview the Security-by-Contract approach that validates at load time that the application code respects the interaction policies of other applications already on the card, and discuss how this approach can be used to address the challenging change scenarios in the target use cases. © 2013 Springer-Verlag.
UR - https://www.scopus.com/pages/publications/84883313230
UR - https://www.scopus.com/inward/citedby.url?scp=84883313230&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-40615-7_7
DO - 10.1007/978-3-642-40615-7_7
M3 - Conference contribution
SN - 9783642406140
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 197
EP - 215
BT - Formal Methods for Components and Objects - 11th International Symposium, FMCO 2012, Revised Lectures
T2 - 11th International Symposium on Formal Methods for Components and Objects, FMCO 2012
Y2 - 24 September 2012 through 28 September 2012
ER -