Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jan Verschuren is active.

Publication


Featured researches published by Jan Verschuren.


information security | 2003

PINPAS: a Tool for Power Analysis of Smartcards

J.I. den Hartog; Jan Verschuren; E.P. de Vink; J. Vos; W. Wiersma

This paper describes the PINPAS tool, a tool for the simulation of power analysis and other side-channel attacks on smartcards. The PINPAS tool supports the testing of algorithms for vulnerability to SPA, DPA, etc. at the software level. Exploitation of the PINPAS tool allows for the identification of weaknesses in the implementation in an early stage of development. A toy algorithm is discussed to illustrate the usage of the tool.


Lecture Notes in Computer Science | 2009

Architecting Security with Paradigm

S Suzana Andova; Luuk Groenewegen; Jan Verschuren; Erik P. de Vink

For large security systems a clear separation of concerns is achieved through architecting. Particularly the dynamic consistency between the architectural components should be addressed, in addition to individual component behaviour. In this paper, relevant dynamic consistency is specified through Paradigm, a coordination modeling language based on dynamic constraints. As it is argued, this fits well with security issues. A smaller example introduces the architectural approach towards implementing security policies. A larger casestudy illustrates the use of Paradigm in analyzing the FOO voting scheme. In addition, translating the Paradigm models into process algebra brings model checking within reach. Security properties of the examples discussed, are formally verified with the model checker mCRL2.


[1992] Proceedings International Workshop on Advanced Communications and Applications for High Speed Networks | 1992

Efficient Realisation of Security Services in the Osi-Rm

Jan Verschuren; René Govaerts; Joos Vandewalle

The IS0 Reference Model for Open Systems Interconnection (0%-RM) enables Application Processes (APs) on different computersystems to exchange information. In case sensitive infomation is exchanged, APs will intend to protect their information according to their respective security policies. In this article the assumption is made that the security policies of the APs intending to communicate are the same: they are defmed by the Bell-LaPadula model. I t is investigated how the OSI-security services can help in realising a security policy defined by the Bell-LaPadula model. I t turned out that enforcement of the BellLaPadula security policy on a network wide basis not only requires the confidentiality service to be implemented. Also integrity services are important in order to prevent undetected modification of the sensitivity class of the data transferred. To deal with the considerable amount of cryptographic mechanisms which can be applied, we chose to indicate them globally: it is specified what keys can be used by each AP. Thus it follows what key is available for enciphering information or for providing the integrity of informat ion. Several distributions of keys emerge, all of them able to support the B-LP-model. A selection out of these is made, after discussing their strong and weak points. For both individuals and companies, it is essential that they can exchange and receive information. Several ways can be used to do this e.g. by talking or by writing. Electronic exchange of messages (by means of e-mail for example) is also a possibility. As information can be very critical and important for individuals and certainly for companies, it is of the utmost importance that they keep control over it. Therefore the possessor of information has a security policy i.e. a set of laws, rules and practices that regulate how sensitive information is to be managed, protected and distributed. As these rules are written in a natural language, they are in general susceptible to multiple interpretations on specific points. To avoid this ambiguity, the policy needs to be restated in a formal language thus resulting in a so called formal security policy model (FSPM). The Bell-LaPadula (B-LP) model [l] is an example of a FSPM. The security policy needs to be fulfilled independent of the configuration which is used to transfer the information. More specifically, one can imagine a stand-alone configuration where communication takes place between two Application Processes (APs) which are both resident on the (same) machine. It is also possible that APs are running on different end-systems which are connected by means of public telecommuni-


Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018

Extending Paradigm with Data

Luuk Groenewegen; Jan Verschuren; Erik P. de Vink

We discuss an extension of the coordination modeling language Paradigm. The extension is geared towards data-dependent interaction among components, where the coordination is influenced by possibly distributed data. The approach is illustrated by the well-known example of a bakery where tickets are issued to serve clients in order. Also, it is described how to encode Paradigm models with data in the process language of the mCRL2 toolset for further analysis of the coordination.


Lecture Notes in Computer Science | 1993

ISO-OSI security architecture

Jan Verschuren; René Govaerts; Joos Vandewalle


Systems & Control Letters | 2009

Architecting Security with Paradigm in Architecting Dependable Systems IV

S Suzana Andova; Luuk Groenewegen; Jan Verschuren; Vink de E. P


workshop on algorithms and data structures | 2008

Architecting Security with Paradigm.

S Suzana Andova; Luuk Groenewegen; Jan Verschuren; Erik P. de Vink


Cryogenics | 2003

PINPAS: A Tool for Power Analysis of Smartcards

Jerry I. den Hartog; Jan Verschuren; Erik P. de Vink; Jaap De Vos; W. Wiersma; Dimitris Gritzalis


Proceedings of the 13th Symposium on Information Theory in the Benelux | 1992

Relationship between the Bell-LaPadula security policy and security services in the OSI-RM

Jan Verschuren; René Govaerts; Joos Vandewalle

Collaboration


Dive into the Jan Verschuren's collaboration.

Top Co-Authors

Avatar

Erik P. de Vink

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

S Suzana Andova

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar

Joos Vandewalle

Université catholique de Louvain

View shared research outputs
Top Co-Authors

Avatar

René Govaerts

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

W. Wiersma

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar

E.P. de Vink

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar

J.I. den Hartog

Eindhoven University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge