06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

9.3 Application Deletion<br />

Deletion Request <strong>for</strong> AppD<br />

Application<br />

Deletion<br />

Registry<br />

Application<br />

Sharing Record<br />

Application<br />

Deletion Handler<br />

Dependent<br />

Applications List<br />

Listeners<br />

Unresolved<br />

Dependencies<br />

Cascade Deletion<br />

Handler<br />

Deletion Completed<br />

Card <strong>Security</strong><br />

Manager<br />

Yes<br />

Check<br />

Application<br />

Presence<br />

No<br />

Check<br />

Dependencies<br />

No<br />

Mark Application<br />

Yes<br />

Yes<br />

Record<br />

Resolvable<br />

Dependencies<br />

Dependency Resolver<br />

Dependency<br />

Removable<br />

No<br />

Unresolved<br />

Dependencies<br />

Yes<br />

No<br />

Applications<br />

left<br />

Record<br />

Irresolvable<br />

Dependencies<br />

No<br />

Yes<br />

No<br />

No<br />

No<br />

Last Node<br />

Applications<br />

Left to Delete<br />

Yes<br />

e) Domain Removed<br />

d) Remove Domain<br />

c) Housekeeping<br />

Completed<br />

Application<br />

Removal<br />

a) Notify<br />

Housekeeping b) Authorise Housekeeping<br />

Notify SP<br />

Figure 9.3: Application deletion process in the UCOM<br />

Yes<br />

Parent Node<br />

Notify <strong>User</strong><br />

Yes<br />

Deletion Terminated<br />

Applications <strong>for</strong><br />

Deletion<br />

Resolvable<br />

Dependencies<br />

Authorise<br />

Deletion<br />

Yes<br />

Remove<br />

Dependencies<br />

No<br />

220

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!