MainComputersProgrammingLanguages › Visualising the Structure of an IC-card Security Architecture

Visualising the Structure of an IC-card Security Architecture

Edit Page
Report
Scan day: 07 February 2014 UTC
15
Virus safety - good
Description: Object-oriented dataflow models make it possible to explicitly render security and state manipulations of protocols. Research paper, abstract in HTML, body in Postscript; by Hugh Glaser, Pieter H. Hartel. [Declarative Systems and Software Engineering, DSSE] (December 04, 1995)
Visualising the structure of an IC-card security architecture The standard way of visualising protocols using pictures with boxes and arrows is insufficient to study the protocols in detail. The problem is that the structuring of the protocols relies on elements not explicit in the standard visual rendering. To solve the problem one should visualise not only the operations and the messages but also the state and the security. Using an object oriented data flow model makes it possible to explicitly render the security and the state manipulations of the protocols. The required combination of data flow and object orientedness is provided by the Prograph language. This language has been used to build a prototype of some of the protocols in the load purse transaction of the CEN inter-sector electronic purse draft standard. The resulting conformant prototype provides abstract and concrete views on the system at all levels. The prototype supports animation of the standard, giving the protocol designer feedback on design decisions.
Size: 1039 chars

Contact Information

Phone&Fax:
Address:
Extended:

WEBSITE Info

Page title:DSSE-TR-95-6
Keywords:
Description:
IP-address:152.78.189.252