Session 1: Trends in smart card research

Keynote speaker: Eric Vetillard, Trusted Logic
Reaching Ubiquity through Invisibility
Abstract: The smart card industry has been thriving to achieve an ubiquitous acceptance of smart cards in various industries. It has partly succeeded, since the smart card is widely recognized today as an efficient personal token, and it has become a commodity in many markets, from wireless telephony to identity. On the other hand, from an IT industry point of view, smart cards remain a peculiar platform, difficult to program and access. Nevertheless, we will show that there is obvious progress, and that major technologies are available or almost available that would make the increase the smart card ubiquity, mostly by making the cards invisible to both their holders and the IT developers. The hardware is making the card more and more invisible, from contact cards to contactless and embedded cards; the software is making the card more accessible from servers, terminals, and such accesses will become more and more transparent; finally, the security measures to be taken when programming smart cards can now be automatically verified, and will be more and more transparent to the developer, as security becomes more and more embedded in the smart card's system. All these technologies converge in making the card more invisible, by increasing the level of automation in the integration of cards and in the development of card-related applications.

Jean-Jacques Vandewalle, Gemplus
Smart card research beyond operating systems and security
Abstract: Research in smart cards is commonly understood as a particular research domain within the two large fields of security and operating system. This is correct and well covered by the program of the CASSIS conference. The intent of this talk is to review some situations which may open up additional research opportunities. First, situations described by alternate or innovative smart card usages are motivated thanks to scenarios. Then, research opportunities are presented and organized within a tentative research agenda. At the end smart card technologies and researches should converge with other works for the emergence of an "ambiant intelligence" spread over small computing devices.

Chie Noda, DoCoMo Euro-Labs
Smart Devices for User-Centric Next Generation Mobile Systems
Abstract: Next generation mobile systems are characterized by co-existance of heterogeneous access networks and wide range of terminals from sensor devices to 3D video terminals in ubiquitous environments. User-centric service provisioning is a key for the success of next generation mobile systems. It is a means to reduce complexity of service usage and to provide personalized service on the demands and the behaviour of users . Smart devices holding highly sensitive information such as user profiles and context information will remain as key devices for users. Hardware evolution of smart devices in line with Moore's law enables smart devices to participate in service interoperation toward user-centric service provisioning by a peer-to-peer manner. The talk introduces two projects of smart devices. One is user-centric middleware incorporating smart devices. Another one is EU IST Project WiTness (Wireless Trust for Mobile Business), where smart devices acts an important role to establish a federation of devices, i.e. trusted relationship, for mobile business applications.

Bernd Mathiske, SUN Microsystems
A mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices
Abstract: As small, secure devices become more powerful and more widespread, it has become desirable to support the dynamic provisioning and updating of multiple applications on such devices. We present a simple mechanism for performing such provisioning and updating, even if the applications are mutually distrustful. The mechanism extends CLDC Java technology with a classfile attribute that carries the certificates necessary to enable the added security.