06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.3 UCTD Firewall<br />

and asynchronous application sharing respectively. Synchronous application sharing enables<br />

two applications to communicate in real-time, and they can be considered as real-time<br />

distributed systems. In case of the asynchronous application sharing the communication<br />

between applications can occur when both are available (live in the network). Both schemes<br />

have benets and drawbacks; there<strong>for</strong>e, it is at the sole discretion of the individual set of<br />

client-server applications to decide which mode they will employ. For further explanation<br />

and to provide a contrast between these two mechanisms consider the following examples.<br />

Consider two applications, one of them provides access to certain internet services, and<br />

the second application is an internet identity [193] that acts like a Single-Sign-On (SSO).<br />

Every time a user logs on to the Internet services through the rst application, a connection<br />

has to be established with the second application to provide the internet identity <strong>for</strong> user<br />

authentication and authorisation. This access to the SSO application has to take place<br />

when the rst application connects with the internet services. Such an access is termed as<br />

synchronous access in the UCTD and is based on the Java Card architecture [186]. Such<br />

an access can be based on the Java Card Remote Method Invocation (RMI) [28].<br />

For asynchronous access, we also take an example of two applications. One application<br />

provides electronic wallet functionality, and the second is a loyalty application. Every time<br />

the electronic wallet application is used, the cardholder earns loyalty points. The loyalty<br />

application does not have to be live. The electronic wallet application batches the loyalty<br />

point update task and when the loyalty application becomes live, it can proceed with<br />

updating it. For this purpose, a simple mechanism deployed by the Multos application<br />

sharing would suce. The electronic wallet application batches the APDUs to update the<br />

loyalty application. When the loyalty application comes online, all batched APDUs can<br />

be communicated to it.<br />

In the next section, we describe the goals and requirements of the proposed protocols to<br />

establish application and plat<strong>for</strong>m binding, be<strong>for</strong>e we look into the details of Application<br />

Binding Protocol Local (ABPL) that focuses on the application binding between two<br />

applications on the same UCTD. Later, we discuss the Plat<strong>for</strong>m Binding Protocol (PBP),<br />

and Application Binding Protocol Distributed (ABPD) that are proposed to support<br />

the CDAM.<br />

7.3.7 Minimum Goals and Requirements <strong>for</strong> the Proposed Protocols<br />

The goals and requirements <strong>for</strong> the proposed protocols that facilitate the establishment of<br />

application and plat<strong>for</strong>m binding are listed below. This list is an extension to the list in<br />

section 6.2.3, with the exception of requirements SOG-17 to SOG-19. Later, we will revisit<br />

these goals <strong>for</strong> the protocol comparison in section 7.7.2.<br />

171

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!