{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:08:03Z","timestamp":1743124083677,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540203001"},{"type":"electronic","value":"9783540396505"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39650-5_11","type":"book-chapter","created":{"date-parts":[[2010,6,25]],"date-time":"2010-06-25T15:20:21Z","timestamp":1277479221000},"page":"181-200","source":"Crossref","is-referenced-by-count":6,"title":["Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card"],"prefix":"10.1007","author":[{"given":"Helmut","family":"Scherzer","sequence":"first","affiliation":[]},{"given":"Ran","family":"Canetti","sequence":"additional","affiliation":[]},{"given":"Paul A.","family":"Karger","sequence":"additional","affiliation":[]},{"given":"Hugo","family":"Krawczyk","sequence":"additional","affiliation":[]},{"given":"Tal","family":"Rabin","sequence":"additional","affiliation":[]},{"given":"David C.","family":"Toll","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/3-540-36288-6_16","volume-title":"Public Key Cryptography - PKC 2003","author":"A. Antipa","year":"2002","unstructured":"Antipa, A., Brown, D., Menezes, A., Struik, R., Vanstone, S.: Validation of elliptic curve public keys. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 211\u2013223. Springer, Heidelberg (2002)"},{"key":"11_CR2","unstructured":"Application interface for smartcards used as secure signature creation devices: Part 1 - basic requirements. Technical Report CEN\/ISSS WS\/E-Sign Draft CWA Group K Version 1.05, Secretariat: DIN Deutsches Institut f\u00fcr Normung e.V, Berlin, May 7 (2003)"},{"key":"11_CR3","unstructured":"Bell, D.E., LaPadula, L.J.: Computer security model: Unified exposition and multics interpretation. Technical Report ESD\u2013TR\u201375\u2013306, The MITRE Corporation, Bedford, MA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA (June 1975), \n                  \n                    http:\/\/csrc.nist.gov\/publications\/history\/bell76.pdf"},{"key":"11_CR4","unstructured":"Biba, K.J.: Integrity considerations for secure computer systems. Technical Report ESD\u2013TR\u201376\u2013372, The MITRE Corporation, Bedford, MA, USA, HQ Electronic Systems Division, Hanscom AFB, MA, USA (April 1977)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-45708-9_10","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Security analysis of IKE\u2019s signature-based keyexchange protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 143\u2013161. Springer, Heidelberg (2002)"},{"key":"11_CR6","unstructured":"Chipcards with digital signature application\/function according to SigG and SigV - part 1: Application interface. Technical Report DIN V66291-1, Secretariat: DIN Deutsches Institut f\u00fcr Normung e.V, Berlin, December 15 (1998)"},{"key":"11_CR7","unstructured":"Chipcards with digital signature application\/function according to SigG and SigV - part 4: Basic security services. Technical Report DIN V66291-4, Secretariat: DIN Deutsches Institut f\u00fcr Normung e.V, Berlin, October 17 (2000)"},{"key":"11_CR8","unstructured":"Common security label (CSL). Technical Report MIL-STD-2045-48501, Joint Interoperability and Engineering Organization (JIEO), Fort Monmouth, NJ, January 25 (1995)"},{"issue":"6","key":"11_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR10","unstructured":"DOD 5200.28-STD, Department of Defense, Washington, DC, USA. Department of Defense Trusted Computer System Evaluation Criteria (December 1985), \n                  \n                    http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf"},{"key":"11_CR11","unstructured":"Ellis, J.H.: The story of non-secret encryption. Technical report, Communications- Electronics Security Group (CESG), Cheltenham, UK (1987), \n                  \n                    http:\/\/www.cesg.gov.uk\/publications\/media\/nsecret\/ellis.pdf"},{"key":"11_CR12","unstructured":"Girard, P.: Which security policy for multiapplication smart cards? In. In: Proceedings of the USENIX Workshop on Smartcard Technology, Chicago, IL, pp. 21\u201328 (1999); The USENIX Association"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The internet key exchange (IKE). Technical Report RFC2409 (November 1998), \n                  \n                    ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc2409.txt","DOI":"10.17487\/rfc2409"},{"key":"11_CR14","unstructured":"Information technology - identification cards - integrated circuit(s) cards with contacts - part 3: Electronic signals and transmission protocols. Technical Report ISO\/IEC 7816-3:1997(E), International Organization for Standardization, Gen\u00e8ve, September 18 (1997)"},{"key":"11_CR15","unstructured":"Information technology - identification cards - integrated circuit(s) cards with contacts - part 4: Inter-industry commands for interchange. Technical Report ISO\/IEC 7816-4, International Standards Organization, Gen\u00e8ve (1995)"},{"key":"11_CR16","unstructured":"Information technology - identification cards - integrated circuit(s) cards with contacts - part 15: Cryptographic information application. Technical Report ISO\/IEC CD 7816-15, draft edition, International Organization for Standardization, Gen\u00e8ve (2001)"},{"key":"11_CR17","unstructured":"Information technology - security techniques \u2013 evaluation criteria for it security \u2013 parts 1, 2, and 3. Technical Report ISO\/IEC 15408-1, -2, and -3, International Organization for Standardization, Gen\u00e8ve (1999)"},{"key":"11_CR18","unstructured":"Information technology - security techniques - entity authentication - part 3: Mechanisms using digital signature techniques. Technical Report ISO\/IEC 9798-3, International Organization for Standardization, Gen\u00e8ve, October 15 (1998)"},{"key":"11_CR19","unstructured":"Information technology - security techniques - key management - part 3: Mechanisms using asymetric techniques. Technical Report ISO\/IEC 11770-3, International Organization for Standardization, Gen\u00e8ve, November 1 (1999)"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Karger, P.A.: The lattice security model in a public computing network. In: ACM 78: Proceedings 1978 Annual Conference, Washington, DC, USA, December 4\u20136, vol.\u00a01, pp. 453\u2013459 (1978); Association for Computing Machinery","DOI":"10.1145\/800127.804146"},{"key":"11_CR21","unstructured":"Karger, P.A.: Multi-organizational mandatory access controls for commercial applications. Technical Report RC 21673 (97655), IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, February 22 (2000), \n                  \n                    http:\/\/domino.watson.ibm.com\/library\/CyberDig.nsf\/home"},{"key":"11_CR22","unstructured":"Karger, P.A., Austel, V.R., Toll, D.C.: A new mandatory security policy combining secrecy and integrity. Technical Report RC 21717 (97406), IBM Research Division, Thomas J. Watson Research Center, Yorktown Heights, NY, March 15 (2000), \n                  \n                    http:\/\/domino.watson.ibm.com\/library\/CyberDig.nsf\/home"},{"key":"11_CR23","unstructured":"Karger, P.A., Austel, V.R., Toll, D.C.: Using a mandatory secrecy and integrity policy on smart cards and mobile devices. In: EUROSMART Security Conference, Marseilles, France, June 13\u201315, pp. 134\u2013148 (2000)"},{"key":"11_CR24","unstructured":"Karger, P.A., Austel, V.R., Toll, D.C.: Using mandatory secrecy and integrity for business to business applications on mobile devices. In: Workshop on Innovations in Strong Access Control, Naval Postgraduate School, Monterey, CA, September 25-27 (2000) (published on CD-ROM), \n                  \n                    http:\/\/www.acsac.org\/sac-tac\/wisac00\/wed0830.karger.pdf"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H. Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: the \u2019SIGn-and-MAc\u2019 approach to authenticated diffiehellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 399\u2013424. Springer, Heidelberg (2003)"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: keyed-hashing for message authentication. Technical Report RFC-2104 (February 1997), \n                  \n                    http:\/\/www.faqs.org\/ftp\/rfc\/rfc2104.txt","DOI":"10.17487\/rfc2104"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/BFb0052240","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"C.H. Lim","year":"1997","unstructured":"Lim, C.H., Lee, P.J.: A key recovery attack on discrete log-based schemes using a prime order subgroup. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 249\u2013263. Springer, Heidelberg (1997)"},{"key":"11_CR28","unstructured":"Public key cryptography for the financial services industry, key agreement and key transport using elliptic curve cryptography. Technical Report X9.63-2001, American National Standards Institute, ANSI (2001)"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/10722599_2","volume-title":"Computer Security - ESORICS 2000","author":"G. Schellhorn","year":"2000","unstructured":"Schellhorn, G., Reif, W., Schairer, A., Karger, P., Austel, V., Toll, D.: Verification of a formal security model for multiapplicative smart cards. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 17\u201336. Springer, Heidelberg (2000)"},{"key":"11_CR30","unstructured":"Standard security label for information transfer. Technical Report FIPS PUB 188, National Institute of Standards and Technology, Gaithersburg, MD, September 6 (1994)"},{"key":"11_CR31","unstructured":"Technical rationale behind CSC-STD-003-85: Computer security requirements \u2013 guidance for applying the department of defense trusted computer system evaluation criteria in specific environments. Technical Report CSC-STD-004-85, DoD Computer Security Center, Fort George G. Meade, MD, June 25 (1985)"},{"key":"11_CR32","unstructured":"Wiemers, A.: Kommentare zu application interface for smart cards used as secure signature creation devices, part 1 - basic requirements version 0.14 February 28, 2003 (in German). Technical report, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn, Germany, March 14 (2003)"},{"key":"11_CR33","unstructured":"Williamson, M.J.: Thoughts on cheaper non-secret encryption. Technical report, Communications-Electronics Security Group (CESG), Cheltenham, UK, August 10 (1976), \n                  \n                    http:\/\/www.cesg.gov.uk\/publications\/media\/nsecret\/cheapnse.pdf"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2003"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39650-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:26:37Z","timestamp":1559507197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39650-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540203001","9783540396505"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39650-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}