06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 9<br />

Backup, Migration, and<br />

Decommissioning Mechanisms<br />

Contents<br />

9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212<br />

9.2 Backup and Migration Framework . . . . . . . . . . . . . . . . . 213<br />

9.3 Application Deletion . . . . . . . . . . . . . . . . . . . . . . . . . 217<br />

9.4 Decommissioning Process . . . . . . . . . . . . . . . . . . . . . . 222<br />

9.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223<br />

In this chapter we analyse the backup and migration mechanisms that allow a user to securely<br />

backup, migrate, and restore her smart card contents. These mechanisms enable a<br />

user to retain the same set of applications if she loses her smart card or wants to move<br />

to a new smart card. We conclude the chapter with a discussion of the application deletion<br />

mechanism that is the nal stage in the lifecycle of an application and a UCTD (i.e.<br />

decommissioning).<br />

211

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!