Ontology type: schema:Chapter
2003
AUTHORSHelmut Scherzer , Ran Canetti , Paul A. Karger , Hugo Krawczyk , Tal Rabin , David C. Toll
ABSTRACTThis paper presents an authentication protocol for high-assurance smart card operating systems that support download of mutually suspicious applications. Such a protocol is required to be part of the operating system, rather than the traditional smart card approach of allowing applications to do authentication, because strong authentication is essential for the operating system to protect one application from another. The protocol itself is based on the existing IKE protocol [13], used for authentication in IPSEC. What is new is the integration of an IKE-like protocol with authentication of mandatory secrecy and integrity access controls, the recognition that a single PKI-hierarchy cannot certify identity and all possible mandatory access rights, and the use of IKE to resolve privacy problems found in existing smart card authentication protocols. More... »
PAGES181-200
Computer Security – ESORICS 2003
ISBN
978-3-540-20300-1
978-3-540-39650-5
http://scigraph.springernature.com/pub.10.1007/978-3-540-39650-5_11
DOIhttp://dx.doi.org/10.1007/978-3-540-39650-5_11
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1053479282
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computer Software",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "IBM Deutschland GmbH, Secure Systems and Smart Cards, Sch\u00f6naicher Str. 220, D-71032, B\u00f6blingen, Germany",
"id": "http://www.grid.ac/institutes/grid.424815.e",
"name": [
"IBM Deutschland GmbH, Secure Systems and Smart Cards, Sch\u00f6naicher Str. 220, D-71032, B\u00f6blingen, Germany"
],
"type": "Organization"
},
"familyName": "Scherzer",
"givenName": "Helmut",
"id": "sg:person.010113467435.96",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010113467435.96"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "IBM Research Division, T. J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA",
"id": "http://www.grid.ac/institutes/grid.481554.9",
"name": [
"IBM Research Division, T. J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA"
],
"type": "Organization"
},
"familyName": "Canetti",
"givenName": "Ran",
"id": "sg:person.012320111457.74",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012320111457.74"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "IBM Research Division, T. J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA",
"id": "http://www.grid.ac/institutes/grid.481554.9",
"name": [
"IBM Research Division, T. J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA"
],
"type": "Organization"
},
"familyName": "Karger",
"givenName": "Paul A.",
"id": "sg:person.015233273445.15",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015233273445.15"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Department of Electrical Engineering, Technion, 32000, Haifa, Israel",
"id": "http://www.grid.ac/institutes/grid.6451.6",
"name": [
"IBM Research Division, T. J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA",
"Department of Electrical Engineering, Technion, 32000, Haifa, Israel"
],
"type": "Organization"
},
"familyName": "Krawczyk",
"givenName": "Hugo",
"id": "sg:person.013004021661.30",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "IBM Research Division, T. J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA",
"id": "http://www.grid.ac/institutes/grid.481554.9",
"name": [
"IBM Research Division, T. J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA"
],
"type": "Organization"
},
"familyName": "Rabin",
"givenName": "Tal",
"id": "sg:person.015473523512.58",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "IBM Research Division, T. J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA",
"id": "http://www.grid.ac/institutes/grid.481554.9",
"name": [
"IBM Research Division, T. J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA"
],
"type": "Organization"
},
"familyName": "Toll",
"givenName": "David C.",
"id": "sg:person.012150641467.91",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012150641467.91"
],
"type": "Person"
}
],
"datePublished": "2003",
"datePublishedReg": "2003-01-01",
"description": "This paper presents an authentication protocol for high-assurance smart card operating systems that support download of mutually suspicious applications. Such a protocol is required to be part of the operating system, rather than the traditional smart card approach of allowing applications to do authentication, because strong authentication is essential for the operating system to protect one application from another. The protocol itself is based on the existing IKE protocol [13], used for authentication in IPSEC. What is new is the integration of an IKE-like protocol with authentication of mandatory secrecy and integrity access controls, the recognition that a single PKI-hierarchy cannot certify identity and all possible mandatory access rights, and the use of IKE to resolve privacy problems found in existing smart card authentication protocols.",
"editor": [
{
"familyName": "Snekkenes",
"givenName": "Einar",
"type": "Person"
},
{
"familyName": "Gollmann",
"givenName": "Dieter",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-540-39650-5_11",
"inLanguage": "en",
"isAccessibleForFree": false,
"isPartOf": {
"isbn": [
"978-3-540-20300-1",
"978-3-540-39650-5"
],
"name": "Computer Security \u2013 ESORICS 2003",
"type": "Book"
},
"keywords": [
"authentication protocol",
"access control",
"smart cards",
"operating system",
"mandatory access control",
"strong authentication",
"suspicious applications",
"privacy problems",
"IKE protocol",
"access rights",
"authentication",
"card approach",
"cards",
"IPsec",
"protocol",
"privacy",
"applications",
"download",
"system",
"secrecy",
"recognition",
"integration",
"Ike",
"control",
"use",
"part",
"identity",
"rights",
"problem",
"approach",
"paper"
],
"name": "Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card",
"pagination": "181-200",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1053479282"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-540-39650-5_11"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-540-39650-5_11",
"https://app.dimensions.ai/details/publication/pub.1053479282"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-20T07:42",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_172.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-3-540-39650-5_11"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-39650-5_11'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-39650-5_11'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-39650-5_11'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-39650-5_11'
This table displays all metadata directly associated to this object as RDF triples.
142 TRIPLES
23 PREDICATES
58 URIs
50 LITERALS
7 BLANK NODES