Structuring and Visualising an IC-card Security Standard

The standard way of visualising protocols using pictures with boxes and arrows is insufficient to study the protocols in detail. The problem is that the structuring of the protocols relies on elements not explicit in the usual visual rendering. To solve the problem one should visualise not only the operations and the messages but also the state and the security. This paper presents a system which can be used to visualise a protocol, and is applied to some of the protocols in the load purse transaction of the CEN Inter-sector electronic purse draft standard as an example. The resulting conformant prototype provides abstract and concrete views on the system at all significant levels. The prototype supports animation of the standard, giving the protocol designer feedback on design decisions.

[1]  Larry L. Peterson,et al.  A language-based approach to protocol implementation , 1992, SIGCOMM '92.

[2]  James R. McGraw,et al.  The VAL Language: Description and Analysis , 1982, TOPL.

[3]  Pieter Hartel,et al.  Towards testability in smart card operating system design , 1994 .

[4]  Gregor von Bochmann,et al.  Some Comments on "Transition-Oriented" Versus "Structured" Specification of Distributed Algorithms and Protocols , 1987, IEEE Trans. Software Eng..

[5]  Philip T. Cox,et al.  Prograph: a step towards liberating programming from textual conditioning , 1989, [Proceedings] 1989 IEEE Workshop on Visual Languages.

[6]  M. Stella Atkins Experiments in SR with different upcall program structures , 1988, TOCS.

[7]  Larry L. Peterson,et al.  A language-based approach to protocol implementation , 1993, TNET.

[8]  Arthur H. Veen,et al.  Dataflow machine architecture , 1986, CSUR.

[9]  Jonathan Billington,et al.  PROTEAN: A High-Level Petri Net Tool for the Specification and Verification of Communication Protocols , 1988, IEEE Trans. Software Eng..

[10]  Yechiam Yemini,et al.  NEST: a network simulation and prototyping testbed , 1990, CACM.

[11]  V E Henderson,et al.  On Standardization. , 1922, Canadian Medical Association journal.

[12]  Gerard Tel,et al.  Topics in distributed algorithms , 1991 .

[13]  Gerard J. Holzmann,et al.  Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching , 1987, IEEE Transactions on Software Engineering.

[14]  Jonathan K. Millen,et al.  The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.

[15]  Susan Stepney,et al.  High integrity compilation - a case study , 1993 .