<html xmlns:v="urn:schemas-microsoft-com:vml"
xmlns:o="urn:schemas-microsoft-com:office:office"
xmlns:w="urn:schemas-microsoft-com:office:word"
xmlns="http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=Content-Type content="text/html; charset=windows-1252">
<link rel=File-List href="./eSeal-Dateien/filelist.xml">
<link rel=Edit-Time-Data href="./eSeal-Dateien/editdata.mso">

<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>eSeal</title>
<meta name="description"
content="eSeal, Integrity, Authenticity, Ubicomp, Pervasive Computing">
<meta name="keywords"
content="eSeal, Integrity, Authenticity, Ubicomp, Pervasive Computing">

<!--[if gte mso 9]><xml>
 <o:DocumentProperties>
  <o:Author>Christian Decker</o:Author>
  <o:Description>Copyright Springer-Verlag Heidelberg Berlin 2002</o:Description>
  <o:Template>pervasive2004.dot</o:Template>
  <o:LastAuthor>Michael Beigl</o:LastAuthor>
  <o:Revision>2</o:Revision>
  <o:LastPrinted>2003-11-07T20:53:00Z</o:LastPrinted>
  <o:Created>2004-10-05T15:14:00Z</o:Created>
  <o:LastSaved>2004-10-05T15:14:00Z</o:LastSaved>
  <o:Pages>3</o:Pages>
  <o:Words>5912</o:Words>
  <o:Characters>33704</o:Characters>
  <o:Company>Springer Verlag GmbH &amp; Co.KG</o:Company>
  <o:Bytes>22528</o:Bytes>
  <o:Lines>280</o:Lines>
  <o:Paragraphs>67</o:Paragraphs>
  <o:CharactersWithSpaces>41390</o:CharactersWithSpaces>
  <o:Version>9.6926</o:Version>
 </o:DocumentProperties>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:ActiveWritingStyle Lang="EN-US" VendorID="8" DLLVersion="513" NLCheck="0">1</w:ActiveWritingStyle>
  <w:TrackRevisions/>
  <w:HyphenationZone>21</w:HyphenationZone>
  <w:DrawingGridHorizontalSpacing>6 pt</w:DrawingGridHorizontalSpacing>
  <w:DrawingGridVerticalSpacing>6 pt</w:DrawingGridVerticalSpacing>
  <w:DisplayVerticalDrawingGridEvery>0</w:DisplayVerticalDrawingGridEvery>
  <w:UseMarginsForDrawingGridOrigin/>
  <w:Compatibility>
   <w:WW6BorderRules/>
   <w:FootnoteLayoutLikeWW8/>
   <w:ShapeLayoutLikeWW8/>
   <w:AlignTablesRowByRow/>
   <w:ForgetLastTabAlignment/>
   <w:LayoutRawTableWidth/>
   <w:LayoutTableRowsApart/>
  </w:Compatibility>
 </w:WordDocument>
</xml><![endif]-->
<style>
<!--
 /* Font Definitions */
@font-face
	{font-family:TIMES;
	panose-1:2 2 6 3 5 4 5 2 3 4;
	mso-font-charset:0;
	mso-generic-font-family:roman;
	mso-font-pitch:variable;
	mso-font-signature:31367 -2147483648 8 0 255 0;}
@font-face
	{font-family:Courier;
	panose-1:0 0 0 0 0 0 0 0 0 0;
	mso-font-alt:"Courier New";
	mso-font-charset:0;
	mso-generic-font-family:modern;
	mso-font-format:other;
	mso-font-pitch:fixed;
	mso-font-signature:3 0 0 0 1 0;}
@font-face
	{font-family:"Tms Rmn";
	panose-1:0 0 0 0 0 0 0 0 0 0;
	mso-font-alt:"Times New Roman";
	mso-font-charset:0;
	mso-generic-font-family:roman;
	mso-font-format:other;
	mso-font-pitch:variable;
	mso-font-signature:3 0 0 0 1 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;
	mso-font-charset:2;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:0 268435456 0 0 -2147483648 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-parent:"";
	margin:0in;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
h1
	{mso-style-next:Standard;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:80.0pt;
	margin-left:0in;
	text-align:justify;
	line-height:16.0pt;
	mso-line-height-rule:exactly;
	page-break-before:always;
	mso-pagination:widow-orphan lines-together;
	page-break-after:avoid;
	mso-outline-level:1;
	mso-hyphenate:none;
	tab-stops:14.2pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:14.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-bidi-font-family:"Times New Roman";
	mso-font-kerning:0pt;
	mso-ansi-language:EN-US;
	mso-bidi-font-weight:normal;}
h2
	{mso-style-next:Standard;
	margin-top:26.0pt;
	margin-right:0in;
	margin-bottom:14.0pt;
	margin-left:0in;
	text-align:justify;
	line-height:14.0pt;
	mso-line-height-rule:exactly;
	mso-pagination:widow-orphan lines-together;
	page-break-after:avoid;
	mso-outline-level:2;
	mso-hyphenate:none;
	tab-stops:22.7pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	mso-bidi-font-weight:normal;}
h3
	{mso-style-next:Standard;
	margin-top:22.0pt;
	margin-right:0in;
	margin-bottom:11.0pt;
	margin-left:0in;
	text-align:justify;
	line-height:12.0pt;
	mso-line-height-rule:exactly;
	mso-pagination:widow-orphan lines-together;
	page-break-after:avoid;
	mso-outline-level:3;
	mso-hyphenate:none;
	tab-stops:25.5pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	mso-bidi-font-weight:normal;}
h4
	{mso-style-next:Standard;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	text-align:justify;
	text-indent:0in;
	mso-pagination:widow-orphan;
	page-break-after:avoid;
	mso-outline-level:4;
	mso-list:l0 level4 lfo1;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:12.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Arial;
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	mso-bidi-font-weight:normal;}
h5
	{mso-style-next:Standard;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	text-align:justify;
	text-indent:0in;
	mso-pagination:widow-orphan;
	mso-outline-level:5;
	mso-list:l0 level5 lfo1;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:11.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Arial;
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	font-weight:normal;}
h6
	{mso-style-next:Standard;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	text-align:justify;
	text-indent:0in;
	mso-pagination:widow-orphan;
	mso-outline-level:6;
	mso-list:l0 level6 lfo1;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:11.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	font-weight:normal;
	font-style:italic;
	mso-bidi-font-style:normal;}
p.MsoHeading7, li.MsoHeading7, div.MsoHeading7
	{mso-style-next:Standard;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	text-align:justify;
	text-indent:0in;
	mso-pagination:widow-orphan;
	mso-outline-level:7;
	mso-list:l0 level7 lfo1;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:Arial;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.MsoHeading8, li.MsoHeading8, div.MsoHeading8
	{mso-style-next:Standard;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	text-align:justify;
	text-indent:0in;
	mso-pagination:widow-orphan;
	mso-outline-level:8;
	mso-list:l0 level8 lfo1;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:Arial;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	font-style:italic;
	mso-bidi-font-style:normal;}
p.MsoHeading9, li.MsoHeading9, div.MsoHeading9
	{mso-style-next:Standard;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	text-align:justify;
	text-indent:0in;
	mso-pagination:widow-orphan;
	mso-outline-level:9;
	mso-list:l0 level9 lfo1;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:Arial;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	font-weight:bold;
	mso-bidi-font-weight:normal;
	font-style:italic;
	mso-bidi-font-style:normal;}
p.MsoFootnoteText, li.MsoFootnoteText, div.MsoFootnoteText
	{margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:8.5pt;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:-8.5pt;
	mso-pagination:widow-orphan;
	tab-stops:8.5pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.MsoCommentText, li.MsoCommentText, div.MsoCommentText
	{margin:0in;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.MsoHeader, li.MsoHeader, div.MsoHeader
	{margin:0in;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	tab-stops:center 3.15in right 6.3in;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.MsoFooter, li.MsoFooter, div.MsoFooter
	{margin:0in;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	tab-stops:center 3.15in right 6.3in;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.MsoCaption, li.MsoCaption, div.MsoCaption
	{mso-style-next:Standard;
	margin-top:6.0pt;
	margin-right:0in;
	margin-bottom:6.0pt;
	margin-left:0in;
	text-align:justify;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	font-weight:bold;
	mso-bidi-font-weight:normal;}
span.MsoFootnoteReference
	{mso-ansi-font-size:6.0pt;
	mso-text-raise:3.0pt;
	vertical-align:baseline;
	vertical-align:baseline;}
span.MsoCommentReference
	{mso-ansi-font-size:8.0pt;
	mso-bidi-font-size:8.0pt;}
p.MsoBodyTextIndent, li.MsoBodyTextIndent, div.MsoBodyTextIndent
	{margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:11.35pt;
	margin-bottom:.0001pt;
	text-align:justify;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.MsoBodyTextIndent2, li.MsoBodyTextIndent2, div.MsoBodyTextIndent2
	{margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.25in;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:"Courier New";
	mso-fareast-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.MsoBodyTextIndent3, li.MsoBodyTextIndent3, div.MsoBodyTextIndent3
	{margin:0in;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;
	text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;
	text-underline:single;}
p.title, li.title, div.title
	{mso-style-name:title;
	mso-style-next:author;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:23.0pt;
	margin-left:0in;
	text-align:center;
	text-indent:11.35pt;
	line-height:17.4pt;
	mso-line-height-rule:exactly;
	page-break-before:always;
	mso-pagination:widow-orphan lines-together;
	page-break-after:avoid;
	mso-hyphenate:none;
	tab-stops:14.2pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:14.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	font-weight:bold;
	mso-bidi-font-weight:normal;}
p.author, li.author, div.author
	{mso-style-name:author;
	mso-style-next:authorinfo;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:11.0pt;
	margin-left:0in;
	text-align:center;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.authorinfo, li.authorinfo, div.authorinfo
	{mso-style-name:authorinfo;
	mso-style-next:email;
	margin:0in;
	margin-bottom:.0001pt;
	text-align:center;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.email, li.email, div.email
	{mso-style-name:email;
	mso-style-next:abstract;
	margin:0in;
	margin-bottom:.0001pt;
	text-align:center;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.abstract, li.abstract, div.abstract
	{mso-style-name:abstract;
	mso-style-parent:p1a;
	mso-style-next:heading1;
	margin-top:30.0pt;
	margin-right:28.35pt;
	margin-bottom:6.0pt;
	margin-left:28.35pt;
	text-align:justify;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.p1a, li.p1a, div.p1a
	{mso-style-name:p1a;
	mso-style-next:Standard;
	margin:0in;
	margin-bottom:.0001pt;
	text-align:justify;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.heading1, li.heading1, div.heading1
	{mso-style-name:heading1;
	mso-style-next:p1a;
	margin-top:26.0pt;
	margin-right:0in;
	margin-bottom:14.0pt;
	margin-left:0in;
	text-align:justify;
	mso-pagination:widow-orphan lines-together;
	page-break-after:avoid;
	mso-hyphenate:none;
	tab-stops:22.7pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:12.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	font-weight:bold;
	mso-bidi-font-weight:normal;}
p.heading2, li.heading2, div.heading2
	{mso-style-name:heading2;
	mso-style-next:p1a;
	margin-top:22.0pt;
	margin-right:0in;
	margin-bottom:11.0pt;
	margin-left:0in;
	text-align:justify;
	mso-pagination:widow-orphan lines-together;
	page-break-after:avoid;
	mso-hyphenate:none;
	tab-stops:25.5pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	font-weight:bold;
	mso-bidi-font-weight:normal;}
p.heading3, li.heading3, div.heading3
	{mso-style-name:heading3;
	mso-style-next:p1a;
	margin-top:16.0pt;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:0in;
	margin-bottom:.0001pt;
	text-align:justify;
	mso-pagination:widow-orphan lines-together;
	page-break-after:avoid;
	mso-hyphenate:none;
	tab-stops:14.2pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	font-weight:bold;
	mso-bidi-font-weight:normal;}
p.equation, li.equation, div.equation
	{mso-style-name:equation;
	mso-style-next:Standard;
	margin-top:6.0pt;
	margin-right:0in;
	margin-bottom:6.0pt;
	margin-left:11.35pt;
	text-align:center;
	text-indent:11.35pt;
	mso-pagination:widow-orphan;
	tab-stops:311.85pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.figlegend, li.figlegend, div.figlegend
	{mso-style-name:figlegend;
	mso-style-next:Standard;
	margin-top:6.0pt;
	margin-right:0in;
	margin-bottom:12.0pt;
	margin-left:0in;
	text-align:justify;
	mso-pagination:widow-orphan lines-together;
	page-break-after:avoid;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.tablelegend, li.tablelegend, div.tablelegend
	{mso-style-name:tablelegend;
	mso-style-next:Standard;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:6.0pt;
	margin-left:0in;
	text-align:justify;
	mso-pagination:widow-orphan lines-together;
	page-break-after:avoid;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";}
p.reference, li.reference, div.reference
	{mso-style-name:reference;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:11.35pt;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:-11.35pt;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.Runninghead-left, li.Runninghead-left, div.Runninghead-left
	{mso-style-name:"Running head - left";
	margin-top:0in;
	margin-right:0in;
	margin-bottom:12.0pt;
	margin-left:0in;
	line-height:12.0pt;
	mso-line-height-rule:exactly;
	mso-pagination:widow-orphan;
	tab-stops:34.0pt right 311.85pt 345.85pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.Runninghead-right, li.Runninghead-right, div.Runninghead-right
	{mso-style-name:"Running head - right";
	mso-style-parent:"Running head - left";
	margin-top:0in;
	margin-right:0in;
	margin-bottom:12.0pt;
	margin-left:0in;
	text-align:right;
	line-height:12.0pt;
	mso-line-height-rule:exactly;
	mso-pagination:widow-orphan;
	tab-stops:34.0pt right 311.85pt 345.85pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.BulletItem, li.BulletItem, div.BulletItem
	{mso-style-name:"Bullet Item";
	mso-style-parent:Item;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:11.35pt;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:-11.35pt;
	mso-pagination:widow-orphan;
	tab-stops:11.35pt 22.7pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.Item, li.Item, div.Item
	{mso-style-name:Item;
	mso-style-next:Standard;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:11.35pt;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:-11.35pt;
	mso-pagination:widow-orphan;
	tab-stops:11.35pt 22.7pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.NumberedItem, li.NumberedItem, div.NumberedItem
	{mso-style-name:"Numbered Item";
	mso-style-parent:Item;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:11.35pt;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:-11.35pt;
	mso-pagination:widow-orphan;
	tab-stops:11.35pt 22.7pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.programcode, li.programcode, div.programcode
	{mso-style-name:programcode;
	margin-top:6.0pt;
	margin-right:0in;
	margin-bottom:6.0pt;
	margin-left:11.35pt;
	mso-pagination:widow-orphan;
	tab-stops:68.05pt 76.55pt 85.05pt 93.55pt 102.05pt 110.55pt 119.05pt 127.6pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:Courier;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.FunotentextFootnote, li.FunotentextFootnote, div.FunotentextFootnote
	{mso-style-name:"Fußnotentext\.Footnote";
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:8.5pt;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:-8.5pt;
	mso-pagination:widow-orphan;
	tab-stops:8.5pt;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.heading4, li.heading4, div.heading4
	{mso-style-name:heading4;
	mso-style-next:p1a;
	margin-top:16.0pt;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:0in;
	margin-bottom:.0001pt;
	text-align:justify;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;
	font-style:italic;
	mso-bidi-font-style:normal;}
p.figurelegend, li.figurelegend, div.figurelegend
	{mso-style-name:"figure legend";
	mso-style-next:Standard;
	margin-top:6.0pt;
	margin-right:0in;
	margin-bottom:12.0pt;
	margin-left:0in;
	text-align:justify;
	line-height:11.0pt;
	mso-line-height-rule:exactly;
	mso-pagination:widow-orphan lines-together;
	page-break-after:avoid;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.References, li.References, div.References
	{mso-style-name:References;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.25in;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:-.25in;
	mso-pagination:widow-orphan;
	mso-list:l14 level1 lfo27;
	tab-stops:list .25in;
	font-size:8.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
p.referenceitem, li.referenceitem, div.referenceitem
	{mso-style-name:referenceitem;
	mso-style-parent:reference;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:11.35pt;
	margin-bottom:.0001pt;
	text-align:justify;
	text-indent:-11.35pt;
	mso-pagination:widow-orphan;
	mso-layout-grid-align:none;
	punctuation-wrap:simple;
	text-autospace:none;
	font-size:9.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:TIMES;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	mso-ansi-language:EN-US;}
span.m
	{mso-style-name:m;}
span.msoIns
	{mso-style-type:export-only;
	mso-style-name:"";
	text-decoration:underline;
	text-underline:single;
	color:teal;}
span.msoDel
	{mso-style-type:export-only;
	mso-style-name:"";
	text-decoration:line-through;
	color:red;}
 /* Page Definitions */
@page
	{mso-mirror-margins:yes;
	mso-facing-pages:yes;}
@page Section1
	{size:595.35pt 842.0pt;
	margin:147.4pt 124.75pt 147.4pt 124.75pt;
	mso-header-margin:119.05pt;
	mso-footer-margin:69.45pt;
	mso-title-page:yes;
	mso-paper-source:0;}
div.Section1
	{page:Section1;}
 /* List Definitions */
@list l0
	{mso-list-id:-5;
	mso-list-template-ids:1061064334;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:none;
	mso-level-text:"";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:0in;
	text-indent:0in;}
@list l0:level2
	{mso-level-start-at:0;
	mso-level-number-format:none;
	mso-level-text:"";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:0in;
	text-indent:0in;}
@list l0:level3
	{mso-level-start-at:0;
	mso-level-number-format:none;
	mso-level-text:"";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:0in;
	text-indent:0in;}
@list l0:level4
	{mso-level-start-at:0;
	mso-level-style-link:"Überschrift 4";
	mso-level-text:%4;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:0in;
	mso-level-legacy-space:0in;
	margin-left:0in;
	text-indent:0in;
	font-family:"Tms Rmn";}
@list l0:level5
	{mso-level-start-at:0;
	mso-level-style-link:"Überschrift 5";
	mso-level-text:%5;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:0in;
	mso-level-legacy-space:0in;
	margin-left:0in;
	text-indent:0in;
	font-family:"Tms Rmn";}
@list l0:level6
	{mso-level-start-at:0;
	mso-level-style-link:"Überschrift 6";
	mso-level-text:%6;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:0in;
	mso-level-legacy-space:0in;
	margin-left:0in;
	text-indent:0in;
	font-family:"Tms Rmn";}
@list l0:level7
	{mso-level-start-at:0;
	mso-level-style-link:"Überschrift 7";
	mso-level-text:%7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:0in;
	mso-level-legacy-space:0in;
	margin-left:0in;
	text-indent:0in;
	font-family:"Tms Rmn";}
@list l0:level8
	{mso-level-start-at:0;
	mso-level-style-link:"Überschrift 8";
	mso-level-text:%8;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:0in;
	mso-level-legacy-space:0in;
	margin-left:0in;
	text-indent:0in;
	font-family:"Tms Rmn";}
@list l0:level9
	{mso-level-start-at:0;
	mso-level-style-link:"Überschrift 9";
	mso-level-text:%9;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:0in;
	mso-level-legacy-space:0in;
	margin-left:0in;
	text-indent:0in;
	font-family:"Tms Rmn";}
@list l1
	{mso-list-id:-2;
	mso-list-type:simple;
	mso-list-template-ids:-696757382;}
@list l1:level1
	{mso-level-start-at:0;
	mso-level-text:*;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:0in;
	text-indent:0in;}
@list l2
	{mso-list-id:39133941;
	mso-list-type:hybrid;
	mso-list-template-ids:2071465242;}
@list l2:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l3
	{mso-list-id:52394542;
	mso-list-type:hybrid;
	mso-list-template-ids:-604876050;}
@list l3:level1
	{mso-level-start-at:12;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
@list l4
	{mso-list-id:124349234;
	mso-list-type:hybrid;
	mso-list-template-ids:1881588180 67567617 67567619 67567621 67567617 67567619 67567621 67567617 67567619 67567621;}
@list l4:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l5
	{mso-list-id:186674211;
	mso-list-type:simple;
	mso-list-template-ids:-869521540;}
@list l5:level1
	{mso-level-start-at:2;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;
	font-family:"Times New Roman";}
@list l6
	{mso-list-id:342712510;
	mso-list-type:hybrid;
	mso-list-template-ids:215243872;}
@list l6:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
@list l7
	{mso-list-id:437287696;
	mso-list-type:hybrid;
	mso-list-template-ids:-816009674;}
@list l7:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l8
	{mso-list-id:449208282;
	mso-list-template-ids:150352042;}
@list l8:level1
	{mso-level-text:%1;
	mso-level-tab-stop:.25in;
	mso-level-number-position:left;
	margin-left:.25in;
	text-indent:-.25in;}
@list l8:level2
	{mso-level-text:"%1\.%2";
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;}
@list l8:level3
	{mso-level-text:"%1\.%2\.%3";
	mso-level-tab-stop:58.7pt;
	mso-level-number-position:left;
	margin-left:58.7pt;
	text-indent:-.5in;}
@list l8:level4
	{mso-level-text:"%1\.%2\.%3\.%4";
	mso-level-tab-stop:70.05pt;
	mso-level-number-position:left;
	margin-left:70.05pt;
	text-indent:-.5in;}
@list l8:level5
	{mso-level-text:"%1\.%2\.%3\.%4\.%5";
	mso-level-tab-stop:81.4pt;
	mso-level-number-position:left;
	margin-left:81.4pt;
	text-indent:-.5in;}
@list l8:level6
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6";
	mso-level-tab-stop:110.75pt;
	mso-level-number-position:left;
	margin-left:110.75pt;
	text-indent:-.75in;}
@list l8:level7
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7";
	mso-level-tab-stop:122.1pt;
	mso-level-number-position:left;
	margin-left:122.1pt;
	text-indent:-.75in;}
@list l8:level8
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8";
	mso-level-tab-stop:151.45pt;
	mso-level-number-position:left;
	margin-left:151.45pt;
	text-indent:-1.0in;}
@list l8:level9
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8\.%9";
	mso-level-tab-stop:162.8pt;
	mso-level-number-position:left;
	margin-left:162.8pt;
	text-indent:-1.0in;}
@list l9
	{mso-list-id:615141285;
	mso-list-type:simple;
	mso-list-template-ids:-1956475040;}
@list l9:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:11.35pt;
	mso-level-legacy-space:0in;
	margin-left:11.35pt;
	text-indent:-11.35pt;}
@list l10
	{mso-list-id:700476692;
	mso-list-type:simple;
	mso-list-template-ids:-869521540;}
@list l10:level1
	{mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;
	font-family:"Times New Roman";}
@list l11
	{mso-list-id:729381030;
	mso-list-type:simple;
	mso-list-template-ids:-869521540;}
@list l11:level1
	{mso-level-start-at:2;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;
	font-family:"Times New Roman";}
@list l12
	{mso-list-id:759908428;
	mso-list-type:simple;
	mso-list-template-ids:-1956475040;}
@list l12:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:11.35pt;
	mso-level-legacy-space:0in;
	margin-left:11.35pt;
	text-indent:-11.35pt;}
@list l13
	{mso-list-id:796409033;
	mso-list-type:hybrid;
	mso-list-template-ids:1040342600 67567631 67567641 67567643 67567631 67567641 67567643 67567631 67567641 67567643;}
@list l13:level1
	{mso-level-tab-stop:.25in;
	mso-level-number-position:left;
	margin-left:.25in;
	text-indent:-.25in;}
@list l14
	{mso-list-id:981957988;
	mso-list-type:simple;
	mso-list-template-ids:1571224598;}
@list l14:level1
	{mso-level-style-link:References;
	mso-level-text:"\[%1\]";
	mso-level-tab-stop:.25in;
	mso-level-number-position:left;
	margin-left:.25in;
	text-indent:-.25in;}
@list l15
	{mso-list-id:989941626;
	mso-list-template-ids:1817076020;}
@list l15:level1
	{mso-level-start-at:2;
	mso-level-text:%1;
	mso-level-tab-stop:19.5pt;
	mso-level-number-position:left;
	margin-left:19.5pt;
	text-indent:-19.5pt;}
@list l15:level2
	{mso-level-text:"%1\.%2";
	mso-level-tab-stop:19.5pt;
	mso-level-number-position:left;
	margin-left:19.5pt;
	text-indent:-19.5pt;}
@list l15:level3
	{mso-level-text:"%1\.%2\.%3";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l15:level4
	{mso-level-text:"%1\.%2\.%3\.%4";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l15:level5
	{mso-level-text:"%1\.%2\.%3\.%4\.%5";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l15:level6
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6";
	mso-level-tab-stop:.75in;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.75in;}
@list l15:level7
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7";
	mso-level-tab-stop:.75in;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.75in;}
@list l15:level8
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8";
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	margin-left:1.0in;
	text-indent:-1.0in;}
@list l15:level9
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8\.%9";
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	margin-left:1.0in;
	text-indent:-1.0in;}
@list l16
	{mso-list-id:1026324830;
	mso-list-type:hybrid;
	mso-list-template-ids:-417937166 1282539838 67567641 67567643 67567631 67567641 67567643 67567631 67567641 67567643;}
@list l16:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:53.25pt;
	mso-level-number-position:left;
	margin-left:53.25pt;
	text-indent:-.25in;}
@list l17
	{mso-list-id:1042291871;
	mso-list-type:simple;
	mso-list-template-ids:-869521540;}
@list l17:level1
	{mso-level-start-at:2;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;
	font-family:"Times New Roman";}
@list l18
	{mso-list-id:1085031942;
	mso-list-type:hybrid;
	mso-list-template-ids:1098307426 67567617 67567619 67567621 67567617 67567619 67567621 67567617 67567619 67567621;}
@list l18:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l19
	{mso-list-id:1101685576;
	mso-list-type:hybrid;
	mso-list-template-ids:2120503956 67567631 67567641 67567643 67567631 67567641 67567643 67567631 67567641 67567643;}
@list l19:level1
	{mso-level-start-at:2;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l20
	{mso-list-id:1142119435;
	mso-list-type:simple;
	mso-list-template-ids:-869521540;}
@list l20:level1
	{mso-level-start-at:2;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;
	font-family:"Times New Roman";}
@list l21
	{mso-list-id:1180119593;
	mso-list-type:simple;
	mso-list-template-ids:-869521540;}
@list l21:level1
	{mso-level-start-at:2;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;
	font-family:"Times New Roman";}
@list l22
	{mso-list-id:1244990794;
	mso-list-type:hybrid;
	mso-list-template-ids:-442203488 67567633 67567641 67567643 67567631 67567641 67567643 67567631 67567641 67567643;}
@list l22:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l23
	{mso-list-id:1287807912;
	mso-list-type:simple;
	mso-list-template-ids:-869521540;}
@list l23:level1
	{mso-level-start-at:2;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;
	font-family:"Times New Roman";}
@list l24
	{mso-list-id:1515151652;
	mso-list-type:simple;
	mso-list-template-ids:-869521540;}
@list l24:level1
	{mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;
	font-family:"Times New Roman";}
@list l25
	{mso-list-id:1621302718;
	mso-list-type:simple;
	mso-list-template-ids:-869521540;}
@list l25:level1
	{mso-level-start-at:2;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;
	font-family:"Times New Roman";}
@list l26
	{mso-list-id:1630817068;
	mso-list-type:simple;
	mso-list-template-ids:-1956475040;}
@list l26:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:11.35pt;
	mso-level-legacy-space:0in;
	margin-left:11.35pt;
	text-indent:-11.35pt;}
@list l27
	{mso-list-id:1754427548;
	mso-list-type:hybrid;
	mso-list-template-ids:-604876050;}
@list l27:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l28
	{mso-list-id:1803032804;
	mso-list-type:hybrid;
	mso-list-template-ids:1943182496;}
@list l28:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
@list l29
	{mso-list-id:2007511357;
	mso-list-type:hybrid;
	mso-list-template-ids:1247999978;}
@list l29:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l30
	{mso-list-id:2008172452;
	mso-list-type:hybrid;
	mso-list-template-ids:2127737814;}
@list l30:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:29.35pt;
	mso-level-number-position:left;
	margin-left:29.35pt;
	text-indent:-.25in;
	font-family:Symbol;
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";}
@list l31
	{mso-list-id:2016419686;
	mso-list-type:hybrid;
	mso-list-template-ids:1975558734;}
@list l31:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:47.35pt;
	mso-level-number-position:left;
	margin-left:47.35pt;
	text-indent:-.25in;
	font-family:Symbol;}
@list l32
	{mso-list-id:2123962462;
	mso-list-type:hybrid;
	mso-list-template-ids:-225513960;}
@list l32:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l33
	{mso-list-id:2140343815;
	mso-list-type:hybrid;
	mso-list-template-ids:1790097922;}
@list l33:level1
	{mso-level-tab-stop:.25in;
	mso-level-number-position:left;
	margin-left:.25in;
	text-indent:-.25in;}
@list l33:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:.75in;
	mso-level-number-position:left;
	margin-left:.75in;
	text-indent:-.25in;}
@list l1:level1 lfo8
	{mso-level-start-at:1;
	mso-level-number-format:bullet;
	mso-level-numbering:continue;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:11.35pt;
	mso-level-legacy-space:0in;
	margin-left:11.35pt;
	text-indent:-11.35pt;
	font-family:TIMES;
	mso-bidi-font-family:"Times New Roman";}
@list l1:level1 lfo9
	{mso-level-start-at:1;
	mso-level-number-format:bullet;
	mso-level-numbering:continue;
	mso-level-text:\F02D;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:11.35pt;
	mso-level-legacy-space:0in;
	margin-left:11.35pt;
	text-indent:-11.35pt;
	font-family:TIMES;
	mso-bidi-font-family:"Times New Roman";}
@list l1:level1 lfo22
	{mso-level-start-at:1;
	mso-level-number-format:bullet;
	mso-level-numbering:continue;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:11.35pt;
	mso-level-legacy-space:0in;
	margin-left:11.35pt;
	text-indent:-11.35pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level1 lfo23
	{mso-level-start-at:1;
	mso-level-number-format:bullet;
	mso-level-numbering:continue;
	mso-level-text:\F02D;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	mso-level-legacy:yes;
	mso-level-legacy-indent:11.35pt;
	mso-level-legacy-space:0in;
	margin-left:11.35pt;
	text-indent:-11.35pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext="edit" spidmax="2050"/>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext="edit">
  <o:idmap v:ext="edit" data="1"/>
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=DE link=blue vlink=purple style='tab-interval:35.45pt'>

<div class=Section1>

<p class=title><span lang=EN-US>eSeal - A System for Enhanced Electronic
Assertion of Authenticity and Integrity</span></p>

<p class=author><span style='mso-ansi-language:DE'>Christian Decker<sup>1</sup>,
Michael Beigl<sup>1</sup>, Albert Krohn<sup>1</sup>, Philip Robinson<sup>1</sup>,
Uwe Kubach<sup>2</sup> <o:p></o:p></span></p>

<p class=authorinfo><sup><span lang=EN-US>1 </span></sup><span lang=EN-US>Telecooperation
Office (TecO), University of Karlsruhe</span></p>

<p class=authorinfo><span style='mso-ansi-language:DE'>Vincenz-Priessnitz-Strasse
1, 76131 Karlsruhe, Germany<o:p></o:p></span></p>

  <p class=email><span style='mso-ansi-language:DE'>{cdecker, <a href="mailto:michael@teco.edu">michael</a>, 
    krohn, philip}@teco.edu<o:p></o:p></span></p>

<p class=authorinfo><sup><span lang=EN-US>2 </span></sup><span lang=EN-US>SAP
AG, Corporate Research</span></p>

<p class=authorinfo><span style='mso-ansi-language:DE'>Vincenz-Priessnitz-Strasse
1, 76131 Karlsruhe, Germany<o:p></o:p></span></p>

  <p class=email><span lang=EN-US><span
lang=DE style='color:windowtext;mso-ansi-language:DE;text-decoration:none;
text-underline:none'>uwe.kubach@sap.com</span></span><span
style='mso-ansi-language:DE'> <o:p></o:p></span></p>

<p class=abstract><b style='mso-bidi-font-weight:normal'><span lang=EN-US>Abstract.</span></b><span
lang=EN-US> Ensuring authenticity and integrity are important tasks when
dealing with goods. While in the past seal wax was used to ensure the
integrity, electronic devices are now able to take over this functionality and
provide better, more fine grained, more automated and more secure supervision.
This paper presents eSeal, a system with a computational device at its core
that can be attached to a good, services in the network and a communication
protocol. The system is able to control various kinds of integrity settings and
to notify authenticated instances about consequent violations of integrity. The
system works without infrastructure so that goods can be supervised that are
only accessible in certain locations. The paper motivates the eSeal system and
its design decisions, lists several types of integrity scenarios, presents the
communication protocol and identifies practical conditions for design and
implementation. An implementation in a business relevant scenario is presented
as a proof of concept.</span></p>

<p class=heading1><span lang=EN-US>1.<span style="mso-spacerun: yes">  
</span>Introduction</span></p>

<p class=p1a><span lang=EN-US>It is an important issue to claim and assert the
authenticity and integrity of goods, documents or other valued objects in
storage or transit. In these times objects of value like documents, deeds,
contracts, goods for trade, and other articles, which we collectively refer to
as goods, were stored in a container, which in turn was sealed with wax and the
imprint of a seal ring (bearing an insignia) or a plumb. This method ensured
two important fundamentals of secure and dependable object handling:
Authenticity and integrity. The object’s authenticity is detectable through the
seal ring imprint on the wax and the integrity can be discerned by inspecting
for either of the two physical states of the seal - <i>valid</i> or <i>broken</i>.
Nevertheless, modern technology provides advanced methods for violating both
integrity and authenticity but also enables us to better protect objects of
value.</span></p>

<p class=MsoNormal><span lang=EN-US>This paper introduces an electronic seal
concept, the eSeal. Like a wax-seal, an eSeal can be applied to physical goods
to electronically claim and assert their authenticity and integrity. The eSeal
is intended to claim and assert states but not to protect the object itself.
However, unlike a wax-seal, an eSeal can detect a larger variety of integrity
violations – including electronically originated attempts. It can collect
context information about this violation including the time and location, can
actively monitor and alert and it can perform all these tasks automatically and
autonomously. An eSeal can exchange relevant information with other computer
systems, maintaining a fine-grained correlation of physical conditions and an
interpretation in the information world.</span></p>

<p class=MsoNormal><span lang=EN-US>Although the design and concept are
generally applicable in many areas, this paper motivates and explains the eSeal
concept alongside business applications. In the area of integrity and
authenticity supervision, business applications provide an interesting
environment with numerous demands for eSeal-related applications. Dwelling in
the business application domain also motivates interaction and hence extension
of existing information systems through appropriate interfaces to eSeal
components. </span></p>

<p class=MsoNormal style='tab-stops:91.4pt'><span lang=EN-US>The paper proceeds
to give an analysis about various integrity classes the eSeal can keep track of
and explain the eSeal practical considerations, which include particular
requirements and constraints of the overall system. This leads into the system
design, where the components and their dependencies and tasks are explained and
the operational features are outlined. Due to the system constraints and
operational features, there were particular security and technical challenges
that necessitated further analysis, before practically evaluating the concept
through a concrete application. We also discuss related work towards the end of
this document.</span></p>

<p class=heading1><span lang=EN-US>2.<span style="mso-spacerun: yes">  
</span>Motivation and Analysis</span></p>

<p class=p1a><span lang=EN-US>As a motivating example, see Figure 1, we select
a representative logistic scenario to clarify the capability and advantage of
an eSeal.</span></p>

  <p class=MsoNormal align=center style='text-align:center'><span lang=EN-US>
    <!--[if gte vml 1]><v:shapetype
 id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t"
 path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f">
 <v:stroke joinstyle="miter"/>
 <v:formulas>
  <v:f eqn="if lineDrawn pixelLineWidth 0"/>
  <v:f eqn="sum @0 1 0"/>
  <v:f eqn="sum 0 0 @1"/>
  <v:f eqn="prod @2 1 2"/>
  <v:f eqn="prod @3 21600 pixelWidth"/>
  <v:f eqn="prod @3 21600 pixelHeight"/>
  <v:f eqn="sum @0 0 1"/>
  <v:f eqn="prod @6 1 2"/>
  <v:f eqn="prod @7 21600 pixelWidth"/>
  <v:f eqn="sum @8 21600 0"/>
  <v:f eqn="prod @7 21600 pixelHeight"/>
  <v:f eqn="sum @10 21600 0"/>
 </v:formulas>
 <v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
 <o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="_x0000_i1025" type="#_x0000_t75" style='width:267pt;
 height:84.75pt'>
 <v:imagedata src="./eSeal-Dateien/image001.png" o:title="eseal_milk"/>
</v:shape><![endif]-->
    <![if !vml]>
    <img border=0 width=356 height=113
src="./eSeal-Dateien/image002.jpg" v:shapes="_x0000_i1025" alt="eSeal">
    <![endif]>
    </span></p>

<p class=figurelegend><b style='mso-bidi-font-weight:normal'><span lang=EN-US>Fig.
<span style='mso-field-code:"SEQ Fig\. \\n"'>1</span>.</span></b><span
lang=EN-US> A traditional seal compared to an eSeal</span></p>

<p class=MsoNormal><span lang=EN-US>In this example, a temperature sensitive
good like milk is transported and need to be kept in a certain range of
temperatures for goods’ quality reasons. An eSeal is used to assure the
temperature of the goods during transport between two locations. During the
transport the eSeal permanently monitors the current temperature of the goods.
As long as the temperature is within the acceptable range, the eSeal is
considered to be valid, otherwise broken. Once broken it can never be recovered
to the valid state like a broken wax seal. When the transported goods arrive at
their final destination, the eSeal can report authentically whether the
temperature range was held.</span></p>

<p class=MsoNormal><span lang=EN-US>Like the traditional wax seal on envelopes
the eSeal can protect valuable goods. The simple protection with a wax seal can
be matured with the surveillance of additional conditions. The eSeal can
provide protection for goods sensitive to for instance temperature and light
changes, vibration and radiation. </span></p>

<p class=MsoNormal><span lang=EN-US>To go a bit deeper into the eSeal system,
we analyzed two aspects of its general problem domain, presented as research
questions. First, what are potential breach-of-integrity/authenticity
situations and how are they classified? Second, what are practical constraints
for an eSeal system design and implementation?</span></p>

<p class=heading2><span lang=EN-US>2.1<span style="mso-spacerun: yes">  
</span>Integrity Considerations and Classifications</span></p>

<p class=p1a><span lang=EN-US>The concept of integrity we want to target with
the eSeal system is more than &quot;inviolability&quot;, as guaranteed by wax
seals. Depending on the object and context, integrity may still be in place
even if the object is touched. </span></p>

<p class=p1a><span lang=EN-US>The eSeal domain spans over four different
integrity classes, which we derived from an analysis of four scenarios in the
business areas: storehouse, supply-chain management, office document management
and production. These classes are:</span></p>

<p class=MsoNormal><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.5in;text-indent:-.25in;mso-list:l18 level1 lfo35;
mso-list-change:\F0B7 "Christian Decker" 20040209T2204;tab-stops:list .5in'><![if !supportLists]><span
lang=EN-US style='font-family:Symbol'>·<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>Conditional Integrity</span></b><span lang=EN-US>. This is upheld
when the object’s physical properties and object state remain unaltered or
undamaged. In this case a full access to a sealed object may be allowed, in
that the object may be used, but it is forbidden to change the state of the
internal – e.g. information – or external – e.g. physical shape – of the object
</span></p>

<p class=MsoNormal style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l18 level1 lfo35;mso-list-change:\F0B7 "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
Symbol'>·<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>Relational Integrity</span></b><span lang=EN-US>. This is similar to
the above, but considers the orientation and relation of constituent objects.
Integrity is violated when someone adds or removes something from a sealed object
collective. Objects may consist of several constituent objects like a palette
of goods consist of several goods. </span></p>

<p class=MsoNormal style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l18 level1 lfo35;mso-list-change:\F0B7 "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
Symbol'>·<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>Authorization Integrity</span></b><span lang=EN-US>. This is the
classical wax seal integrity where no unauthorized party is allowed visual or
tangible access to the sealed object. Integrity is broken if someone was able
to see a defined state e.g. internal information but also the outline of the
object. Beyond the &quot;open the container and look&quot; integrity violation,
modern forms of spying include x-ray scans and methods to get access to
internal information – stored programs and data – of an object.</span></p>

<p class=MsoNormal style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l18 level1 lfo35;mso-list-change:\F0B7 "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
Symbol'>·<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>Environmental Integrity</span></b><span lang=EN-US>. In this case
the object’s integrity is violated if its surrounding conditions or context are
unfavorable, e.g. that the object is brought into a place where it should not
be. </span></p>

<p class=p1a><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal><span lang=EN-US>These classes of integrity concerns must at
times be addressed in tandem. For example, a policy could exist that includes
access restrictions (Authorization Integrity) and yet that the object’s
structural properties must not be changed (Intrinsic Conditional Integrity). </span></p>

<p class=MsoNormal><span lang=EN-US>Our method of defining these integrity
classifications includes only a limited number of scenarios. Based on scenario
descriptions we repeated the analysis until we found the same integrity
protection situation again. This way we observed important situations that
contributed to a design of a first eSeal system, but cannot ensure
completeness. Further on, the list is based solely on business scenarios
analysis, whereas other policies may be found when analyzing other areas of
life. As potential exploitation scenarios are within the business area, we do
not consider this a significant system drawback. Subsequently, the remainder of
this section continues within the business area. </span></p>

<p class=heading2><span lang=EN-US>2.2<span style="mso-spacerun: yes">  
</span>Practical Considerations</span></p>

<p class=p1a><span lang=EN-US>The practical considerations and important
requirements for the eSeal system design were derived from the inherent goals
and properties of the business scenarios that were analyzed for the potential
usage of eSeals. They essentially describe and confine the nature of the goods
handled, the locations that they are transited between, and the interaction
with humans. </span></p>

<p class=MsoNormal><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=p1a style='margin-left:.5in;text-indent:-.25in;mso-list:l4 level1 lfo33;
mso-list-change:\F0B7 "Christian Decker" 20040209T2204;tab-stops:list .5in'><![if !supportLists]><span
lang=EN-US style='font-family:Symbol'>·<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>Mobility. </span></b><span lang=EN-US>The eSeal system should not
introduce any handling constrains of objects, work without cabling, be small
and unobtrusive.</span></p>

<p class=p1a style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l4 level1 lfo33;mso-list-change:\F0B7 "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
Symbol'>·<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>Diversity.</span></b><span lang=EN-US> Goods have different physical
properties like size, shape, weight and experience different environmental
conditions. Different values are in the interest to be sealed (e.g. time of
transport, temperature). Therefore the eSeal system must provide a flexible platform
to realize an electronic seal on a certain good.</span></p>

<p class=p1a style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l4 level1 lfo33;mso-list-change:\F0B7 "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
Symbol'>·<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>Incomplete infrastructure coverage.</span></b><span lang=EN-US>
Physical goods can move through<span style="mso-spacerun: yes">  </span>various
situations and different locations or environments. Since the support through
an electronic infrastructure (e.g. W-LAN, cameras) cannot be guaranteed in all
cases, the eSeal system must be able to work offline and autonomous. It must
have intensive contact to the object and experience its environment as genuine
as possible through monitoring equipment and sensors.</span></p>

<p class=heading1><span lang=EN-US>3.<span style="mso-spacerun: yes">  
</span>eSeal System </span></p>

<p class=p1a><span lang=EN-US>Definition: <i>An eSeal is an electronic seal,
which can be applied on physical goods in order to provide the guarantee of
important aspects of the protection of those physical goods. The eSeal does not
physically protect the sealed goods but can provide propositions and evidence
of authenticity and integrity.</i><b> </b></span></p>

<p class=p1a><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=p1a><span lang=EN-US>The eSeal system, see Figure 2, consists of three
conceptual layers: (1) the <i>Contractual</i>, (2) the <i>Logical</i>, and (3)
the <i>Technical</i>. </span></p>

<p class=p1a align=left style='text-align:left'><span lang=EN-US><!--[if gte vml 1]><v:shape
 id="_x0000_i1026" type="#_x0000_t75" style='width:345.75pt;height:172.5pt'>
 <v:imagedata src="./eSeal-Dateien/image003.png" o:title="eSealFigure2"/>
</v:shape><![endif]--><![if !vml]><img border=0 width=461 height=230
src="./eSeal-Dateien/image004.jpg" v:shapes="_x0000_i1026"><![endif]></span></p>

<p class=figurelegend><b style='mso-bidi-font-weight:normal'><span lang=EN-US>Fig.
<span style='mso-field-code:"SEQ Fig\. \\n"'>2</span>.</span></b><span
lang=EN-US> eSeal System and Key Actors</span></p>

<p class=MsoNormal><span lang=EN-US>Firstly, we regard an eSeal as a contract
between an <i>Initiator</i> (a subject that applies the eSeal to a physical
good) and a <i>Receiver</i> (a subject that assesses the evidence presented by
the eSeal) stating the terms and conditions under which the authenticity and
integrity of a physical good can be asserted. Secondly, the system provides
logic for determining and presenting the “protection state” of the target goods
to which it applies. Thirdly, the system is realized through particular
technologies that meet the functional and quality requirements for its
operational domain. In addition, we have also considered the actors that drive
or benefit from the system’s functionality. We have already mentioned the roles
of the Initiator and Receiver, who are considered as the end-points of the
activity chain and the key actors in the contractual aspects of the system.
Supporting the Initiator and Receiver in monitoring the state of the eSeal
system, and hence the contract, are <i>Checkpoints</i>. A Checkpoint is an
intermediary actor that forwards system state to either of the contractual
parties upon their query. A Checkpoint is considered the most proximate trusted
source to the sealed goods at a particular time. Operational system state of
the eSeal is either “valid” or “broken” and this is determined by the
processing of delivery conditions, with which the system is initialized, and
current conditions. A multi-sensory device, attached to the physical goods,
which we simply refer to as the “<i>eSeal device</i>”, senses these current
conditions. </span></p>

<p class=heading2><span lang=EN-US>3.1<span style="mso-spacerun: yes">  
</span>eSeal Device </span></p>

<p class=p1a><span lang=EN-US>The eSeal device is a small embedded computer
system directly attached to physical goods. The intention is to have an entity
which can provide the Initiator or Receiver with a trustworthy statement about
whether the operational system state also referred to as eSeal state is “valid”
or “broken”. An eSeal device implements three core functionalities: First,
computation enables permanent updates of the eSeal’s state using an algorithm
derived from the contract between Initiator and Receiver. Second, a sensor
system as part of the device supplies it with external information serving as
input for the algorithm. Third, the device implements a communication
functionality enabling the exchange of the eSeal’s state and optionally
additionally information with other parties in an authenticated manner. The
eSeal device operates independently and without the support of a surrounded
electronic infrastructure. Optionally, the eSeal device contains a timer to
bind the eSeal’s state to a timestamp and some storage capability to
consecutively write the eSeal’s state history and additional related
information.</span></p>

<p class=heading2><span lang=EN-US>3.2<span style="mso-spacerun: yes">  
</span>eSeal Activity Chain</span></p>

<p class=p1a><span lang=EN-US>The flow of the use of an eSeal, presented in
Figure 3, involves at least three parts of the eSeal system: The Initiator, the
Receiver, the eSeal device and optional Checkpoints.</span></p>

<p class=MsoNormal><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=p1a align=center style='text-align:center'><span lang=EN-US><!--[if gte vml 1]><v:shape
 id="_x0000_i1027" type="#_x0000_t75" style='width:345.75pt;height:154.5pt'>
 <v:imagedata src="./eSeal-Dateien/image005.png" o:title="eseal4"/>
</v:shape><![endif]--><![if !vml]><img border=0 width=461 height=206
src="./eSeal-Dateien/image006.jpg" v:shapes="_x0000_i1027"><![endif]></span></p>

<p class=figurelegend><b style='mso-bidi-font-weight:normal'><span lang=EN-US>Fig.
<span style='mso-field-code:"SEQ Fig\. \\n"'>3</span>.</span></b><span
lang=EN-US> eSeal Activity Chain</span></p>

<p class=MsoNormal><span lang=EN-US>After the successful agreement and
conclusion of a contract between Receiver and Initiator, the Receiver queries
the Initiator to start the activity chain. The definition of the seal to be
applied on the goods is derived from this contract.</span></p>

<p class=MsoNormal><span lang=EN-US>The Initiator combines the eSeal device and
the goods and initializes the eSeal device order to seal the goods which are
subject to the contract and from this moment on, the eSeal device can be
identified by the Receiver, Initiator and Checkpoints and carries the start
state “valid”. The initialization of the eSeal device includes the definition
and download of all necessary information and algorithms that define the seal.
The eSeal device can then continuously monitor the state of the seal.</span></p>

<p class=MsoNormal><span lang=EN-US>If the Receiver or Initiator is interested
in the actual state of the sealed goods, i.e. whether the seal is still valid
or broken, they can query the state from Checkpoints or directly from the eSeal
device using its communication interface. This enables both parties to prove
whether there was an integrity breach or not. </span></p>

<p class=MsoNormal><span lang=EN-US>The activity chain terminates when the
sealed goods reach the Receiver. The Receiver and the Initiator query the state
of the eSeal device for the states “broken” or “valid” and can decide whether
the contract was held. If the eSeal device arrives “broken” at the Receiver,
the contract partners can query the eSeal device for the reason of the breach
of the seal. They can distinguish between breaches due to a contract breach or
cases of attacks. In cases of severe attacks on the eSeal device which
destroyed core functionalities of the eSeal device, this information might be
lost. After the queries and contract examination the Receiver removes the eSeal
device from the goods and thus deactivates the seal.</span></p>

<p class=heading1><span lang=EN-US>4.<span style="mso-spacerun: yes">  
</span>Operational Analysis and Challenges</span></p>

<p class=p1a><span lang=EN-US>When we discussed the eSeal approach in the
second section of the paper, we mentioned two particular aspects of the problem
domain that influenced the properties of the system architecture. These
naturally have a significant bearing on the operational specification of the
system, which is likewise separated. We therefore dedicated some resources to
analyzing the security requirements and deriving a general functional protocol,
and, secondly, analyzing the technical realization of the system based on the
practical constraints. This also took into account the security requirements
that emerged from the analysis, with respect to storage and processing.</span></p>

<p class=heading2><span lang=EN-US>4.1<span style="mso-spacerun: yes">  
</span>Security Analysis</span></p>

<p class=p1a><span lang=EN-US>The Security Analysis considers the eSeal system
actors, the nature of the goods to which it will apply, and the types of
transactions and business scenarios that the system will be involved in. The
eSeal protection goals of Integrity and Authenticity are once again revisited,
but from a more detailed security perspective. There is large commonality with
the concerns of authenticity and integrity in cryptographic analysis.</span></p>

<p class=p1a><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=p1a><i style='mso-bidi-font-style:normal'><span lang=EN-US>Authenticity</span></i><span
lang=EN-US>: The receiver (B) must assert that a good or item (I) was really
sent from a sender (A,) and is hence a genuine article, including that the
electronic information also conforms to these properties. Threats include:</span></p>

<p class=p1a style='margin-left:.5in;text-indent:-.25in;mso-list:l3 level1 lfo25;
mso-list-change:- "Christian Decker" 20040209T2204;tab-stops:list .5in'><![if !supportLists]><span
lang=EN-US style='font-family:"Times New Roman"'>-<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><span lang=EN-US>A false initiator sends I by bearing
A’s identity (source masquerading)</span></p>

<p class=p1a style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l3 level1 lfo25;mso-list-change:- "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
"Times New Roman"'>-<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><span lang=EN-US>I or its electronic information is
replaced in transit by a falsified item or data (replay attack)</span></p>

<p class=p1a style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l3 level1 lfo25;mso-list-change:- "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
"Times New Roman"'>-<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><span lang=EN-US>A false seal sends out item state
information to A and B (seal masquerading)</span></p>

<p class=p1a><span lang=EN-US><span style="mso-spacerun: yes"> </span></span></p>

<p class=p1a><i style='mso-bidi-font-style:normal'><span lang=EN-US>Integrity</span></i><span
lang=EN-US>: both the receiver (B) and initiator (A) must assert that item (I)
(as well as its electronic information) is not tampered with while in transit,
and that the correct handling policies are upheld. Threats include:</span></p>

<p class=p1a style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l3 level1 lfo25;mso-list-change:- "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
"Times New Roman"'>-<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><span lang=EN-US>I is tampered with (seal is broken)
while left unattended, or by an authorised third party, therefore degrading
quality of the product</span></p>

<p class=p1a style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l3 level1 lfo25;mso-list-change:- "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
"Times New Roman"'>-<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><span lang=EN-US>I is subjected to transit conditions
that violate its handling policies</span></p>

<p class=p1a><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal><span lang=EN-US>Other threats include the inevitable
denial-of-service attacks through communications signal interference or
continuous, unwarranted depletion of power resources. Additionally, in the case
of highly sensitive information on the seal, confidentiality becomes another
protection goal of eSeal. The communications protocol and power management
features of the device address the denial-of-service attacks, while
confidentiality is captured within the properties of the crypto protocols and
physical handling policies enforced. These threats and their countermeasures,
especially the asymmetric or public key protocol we use as our foundation, are
well known in the field of security engineering [1]. However, it was a good
opportunity to explore and assess the applicability of these standards within a
domain where the physical and electronic protection goals are so tightly
coupled. </span></p>

<p class=heading2><span lang=EN-US>4.2<span style="mso-spacerun: yes">  
</span>The Detailed eSeal Communication Protocol</span></p>

<p class=p1a><span lang=EN-US>The protocol defined is based on the architecture
depicted in fig. 1. It was specified in response to the security analysis, and
details how the protection goals of the interaction between entity roles are
captured. The protocol consists of 7 interaction phases, corresponding to the
architecture depicted in fig. 1, but also of a set of security functions and
elements defined below.</span></p>

<p class=MsoNormal><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoCaption><span lang=EN-US>Security Functions and Elements</span></p>

<p class=MsoNormal><span lang=EN-US>K</span><sub><span lang=EN-US
style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>X</span></sub><span
lang=EN-US>: <span style='mso-tab-count:2'>                    </span>public
key of an entity x</span></p>

<p class=MsoNormal><span lang=EN-US>M:<span style='mso-tab-count:2'>                     </span>Query
and status messages</span></p>

<p class=MsoNormal><span lang=EN-US>n, q:<span style='mso-tab-count:2'>                   </span>Initial
random sequence number, and sequence counter</span></p>

<p class=MsoNormal><span lang=EN-US>P:<span style='mso-tab-count:2'>                       </span>Handling
policy</span></p>

<p class=MsoNormal><span lang=EN-US>D</span><sub><span lang=EN-US
style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>X</span></sub><span
lang=EN-US>{}: <span style='mso-tab-count:1'>                </span>Decryption
with private key of entity x</span></p>

<p class=MsoNormal><span lang=EN-US>E<sub>x</sub>{}: <span style='mso-tab-count:
1'> </span>Encryption with secret/ private key of an entity x</span></p>

<p class=MsoNormal><span lang=EN-US>H{}:<span style='mso-tab-count:2'>                  </span>Hash
function</span></p>

<p class=MsoNormal><span lang=EN-US>S</span><sub><span lang=EN-US
style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>X</span></sub><span
lang=EN-US>{}: <span style='mso-tab-count:1'> </span>Signing with private key
of an entity x</span></p>

<p class=MsoNormal><span lang=EN-US>V</span><sub><span lang=EN-US
style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>X</span></sub><span
lang=EN-US>{}:<span style='mso-tab-count:2'>                 </span>Verification
of signature with public key of an entity x</span></p>

<p class=MsoNormal style='text-indent:0in'><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-text-indent-alt:
-.25in;mso-list:l33 level1 lfo21;mso-list-change:"%1\:1\:0\:\." "Christian Decker" 20040209T2204;
tab-stops:list .25in'><![if !supportLists]><span lang=EN-US>1.<span
style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>QUERY-ORDER</span></b><span lang=EN-US>: receiver (B) sends an order
request message (M</span><sub><span lang=EN-US style='font-family:"Courier New";
mso-bidi-font-family:"Times New Roman"'>n</span></sub><span lang=EN-US>), with
which the initiator (A) can initialize an eSeal session. To avoid replay
attacks at this stage, a signed hash of M</span><sub><span lang=EN-US
style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>n</span></sub><span
lang=EN-US>, a random number n (used as a sequence number), and ipublic key (K<sub>B</sub>)
of the receiver (B) are also sent to the initiator (A). These are also
encrypted with the public key of the initiator (A) - (i). Upon reception, the
initiator (A) decrypts the packet using its private key – (ii), and then
verifies the sender of the order, using the public key of B – (iii).</span></p>

<p class=MsoNormal style='margin-left:.25in'><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:0in'><span lang=EN-US
style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>B </span><span
lang=EN-US style='font-family:Wingdings;mso-ascii-font-family:"Courier New";
mso-hansi-font-family:"Courier New";mso-char-type:symbol;mso-symbol-font-family:
Wingdings'><span style='mso-char-type:symbol;mso-symbol-font-family:Wingdings'>à</span></span><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>
A: <span style='mso-tab-count:1'> </span>E<sub>A</sub> {M<sub>n</sub>, S<sub>B</sub>{H{M<sub>n</sub>}},
n, K<sub>B</sub>}<span style='mso-tab-count:3'>            </span>(i)<o:p></o:p></span></p>

<p class=MsoNormal style='text-indent:.25in'><span lang=EN-US style='font-family:
"Courier New";mso-bidi-font-family:"Times New Roman"'>A:<span style='mso-tab-count:
2'>       </span>D<sub>A</sub> {E<sub>A</sub> {M<sub>n</sub>, S<sub>B</sub>
{H{M<sub>n</sub>}}, n, K<sub>B</sub>}<span style='mso-tab-count:2'>        </span>(ii)<o:p></o:p></span></p>

<p class=MsoNormal style='text-indent:.25in'><span lang=EN-US style='font-family:
"Courier New";mso-bidi-font-family:"Times New Roman"'><span style='mso-tab-count:
2'>         </span>V<sub>B</sub> {S<sub>B</sub>{H{M<sub>n</sub>}}}<span
style='mso-tab-count:4'>                      </span>(iii)<o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in'><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-text-indent-alt:
-.25in;mso-list:l33 level1 lfo21;mso-list-change:"%1\:2\:0\:\." "Christian Decker" 20040209T2204;
tab-stops:list .25in'><![if !supportLists]><span lang=EN-US>2.<span
style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>INIT-DEFINE</span></b><span lang=EN-US>: initiator (A) starts the
initialization process by defining a handling policy (P, which is a listing of
context parameters), a statement of expected state-on-delivery (M<sub>n+1</sub>),
and by generating a key pair for the seal. The handling policy is encrypted
with the private key of the seal to avoid electronic tampering. The seal is
then electronically initialized with its private key (in protected memory), the
handling policy, the public key of B (for communicating status updates to B
with end-to-end authentication), and the expected state-on-delivery, which is
hashed and signed by the private key of A.</span></p>

<p class=MsoNormal><span lang=EN-US><span style="mso-spacerun: yes"> </span></span></p>

<p class=MsoNormal align=left style='margin-left:.25in;text-align:left'><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>A
</span><span lang=EN-US style='font-family:Wingdings;mso-ascii-font-family:
"Courier New";mso-hansi-font-family:"Courier New";mso-char-type:symbol;
mso-symbol-font-family:Wingdings'><span style='mso-char-type:symbol;mso-symbol-font-family:
Wingdings'>à</span></span><span lang=EN-US style='font-family:"Courier New";
mso-bidi-font-family:"Times New Roman"'> Z:<span style='mso-tab-count:1'> </span>{P,
n, S<sub>A</sub>{H{M<sub>n+1</sub>}}, K<sub>B</sub>, M<sub>n+1</sub>}<span
style='mso-tab-count:2'>         </span>(iv)<o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in'><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in'><span lang=EN-US>A then responds
to B by sending a STATUS (see protocol operation 7), which includes sending the
public key of the seal to B.</span></p>

<p class=MsoNormal><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-text-indent-alt:
-.25in;mso-list:l33 level1 lfo21;mso-list-change:"%1\:3\:0\:\." "Christian Decker" 20040209T2204;
tab-stops:list .25in'><![if !supportLists]><span lang=EN-US>3.<span
style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>SEAL</span></b><span lang=EN-US>: Upon applying the seal to the
item, this triggers the sensors to make the first check (see 6) in order to
have an initial-sealed-state (M<sub>n+2</sub>). The physical process of sealing
also triggers an electronic process of encryption and signing of the
initializing information and initial-sealed state respectively – (v). The seal
can only be opened by parties that can respond to a challenge by the eSeal
device, such as the initiator (A) and receiver (B), as their public keys are
known by the eSeal.</span></p>

<p class=MsoNormal style='margin-left:.25in'><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoBodyTextIndent2 align=left style='margin-left:29.35pt;text-align:
left;text-indent:0in'><span lang=EN-US>Z [I]:<span style='mso-tab-count:1'> </span>E<sub>Z</sub>{P,
n, S<sub>A</sub>{H{M<sub>n+1</sub>}}}, E<sub>B</sub>{M<sub>n+1</sub>}, S<sub>Z</sub>{H{M<sub>n+2</sub>}},
M<sub>n+2</sub><span style='mso-tab-count:6'>                                </span><span
style='mso-tab-count:2'>       </span>(v)</span></p>

<p class=MsoNormal style='margin-left:.25in'><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-text-indent-alt:
-.25in;mso-list:l33 level1 lfo21;mso-list-change:"%1\:4\:0\:\." "Christian Decker" 20040209T2204;
tab-stops:list .25in'><![if !supportLists]><span lang=EN-US>4.<span
style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>QUERY</span></b><span lang=EN-US>: This step in the protocol is
equivalent to an ORDER. The only difference is that B may directly contact the
seal, having received its public key, or it may need to go via a checkpoint E</span><sub><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>A</span></sub><span
lang=EN-US> would therefore be replaced with E</span><sub><span lang=EN-US
style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>Z</span></sub><span
lang=EN-US> , an operation on the eSeal itself, in </span><span lang=EN-US
style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>(i)</span><span
lang=EN-US>, </span><span lang=EN-US style='font-family:"Courier New";
mso-bidi-font-family:"Times New Roman"'>(ii)</span><span lang=EN-US> and </span><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>(iii)</span><span
lang=EN-US>.</span></p>

<p class=MsoNormal><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-text-indent-alt:
-.25in;mso-list:l33 level1 lfo21;mso-list-change:"%1\:5\:0\:\." "Christian Decker" 20040209T2204;
tab-stops:list .25in'><![if !supportLists]><span lang=EN-US>5.<span
style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>CHECK</span></b><span lang=EN-US>: Following an authorized party
QUERY or internally scheduled query, the eSeal (Z) does a poll of its sensors
and compares with the preferred context parameters specified in the handling
policy (P). It then updates the last status (M</span><sub><span lang=EN-US
style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>n</span></sub><span
lang=EN-US>) with current status (M</span><sub><span lang=EN-US
style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>n+q</span></sub><span
lang=EN-US>), where q is equal to the sequence number of the query. There are
three context states that the seal can be set to, and stated in M</span><sub><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>n+q</span></sub><span
lang=EN-US>:</span></p>

<p class=MsoNormal style='text-indent:0in'><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l28 level1 lfo20;mso-list-change:- "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
"Times New Roman"'>-<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><i style='mso-bidi-font-style:normal'><span lang=EN-US>VALID</span></i><span
lang=EN-US>: Current context match handling policy - seal remains intact</span></p>

<p class=MsoNormal style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l28 level1 lfo20;mso-list-change:- "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
"Times New Roman"'>-<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><i style='mso-bidi-font-style:normal'><span lang=EN-US>DEGRADED</span></i><span
lang=EN-US>: Current context does not fully meet policy, but is within an
acceptable bound – seal remains intact but records possible tampering attempt.
For example, is currently in the hands of an unauthorized party.</span></p>

<p class=MsoNormal style='margin-left:.5in;text-indent:-.5in;mso-text-indent-alt:
-.25in;mso-list:l28 level1 lfo20;mso-list-change:- "Christian Decker" 20040209T2204;
tab-stops:list .5in'><![if !supportLists]><span lang=EN-US style='font-family:
"Times New Roman"'>-<span style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><i style='mso-bidi-font-style:normal'><span lang=EN-US>BROKEN</span></i><span
lang=EN-US>: Current context does not meet handling policy – seal is broken and
relevant information is wiped from electronic storage</span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:0in'><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:0in'><span lang=EN-US>The
seal can also record the current handling party and labels them as <i
style='mso-bidi-font-style:normal'>AUTHORIZED</i><span style="mso-spacerun:
yes">  </span>or <i style='mso-bidi-font-style:normal'>UNAUTHORIZED</i>
(unknown or black-marked). A higher-level notification is given off when the
sealed item is being handled by an <i style='mso-bidi-font-style:normal'>UNAUTHORIZED</i>
party.</span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:0in'><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-text-indent-alt:
-.25in;mso-list:l33 level1 lfo21;mso-list-change:"%1\:6\:0\:\." "Christian Decker" 20040209T2204;
tab-stops:list .25in'><![if !supportLists]><span lang=EN-US>6.<span
style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>STATUS-RESPONSE</span></b><span lang=EN-US>: There are two types of
STATUS operations, which both transmit the CHECK to an authorized party. The
first is a response to the authorized parties following a query. It is authenticated
with a signature of the seal (S<sub>Z</sub>). Additionally, depending on the
policy, the status may be encrypted with the public key of the authorized party
before forwarding. This is equivalent to forwarding the result of the crypto
procedure in </span><span lang=EN-US style='font-family:"Courier New";
mso-bidi-font-family:"Times New Roman"'>(v)</span><span lang=EN-US>, where </span><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>q
= 2</span><span lang=EN-US>.</span></p>

<p class=MsoNormal align=left style='text-align:left;text-indent:0in'><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal align=left style='margin-left:.25in;text-align:left'><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>Z
</span><span lang=EN-US style='font-family:Wingdings;mso-ascii-font-family:
"Courier New";mso-hansi-font-family:"Courier New";mso-char-type:symbol;
mso-symbol-font-family:Wingdings'><span style='mso-char-type:symbol;mso-symbol-font-family:
Wingdings'>à</span></span><span lang=EN-US style='font-family:"Courier New";
mso-bidi-font-family:"Times New Roman"'> B:<span style='mso-tab-count:1'> </span>E<sub>B</sub>{S<sub>Z</sub>{H{M<sub>n+q</sub>}},
M<sub>n+q</sub>}<span style='mso-tab-count:2'>           </span>(vi)<o:p></o:p></span></p>

<p class=MsoNormal align=left style='margin-left:.25in;text-align:left'><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'>B:<span
style='mso-tab-count:1'>     </span>V<sub>C</sub>{E<sub>B</sub>{S<sub>Z</sub>{H{M<sub>n+q</sub>}},
M<sub>n+q</sub>}}<span style='mso-tab-count:2'>        </span>(vii)<o:p></o:p></span></p>

<p class=MsoNormal align=left style='margin-left:.25in;text-align:left'><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'><span
style='mso-tab-count:2'>       </span>D<sub>B</sub>{S<sub>Z</sub>{H{M<sub>n+q</sub>}}<span
style='mso-tab-count:3'>                 </span>(viii)<o:p></o:p></span></p>

<p class=MsoNormal align=left style='margin-left:.25in;text-align:left'><span
lang=EN-US style='font-family:"Courier New";mso-bidi-font-family:"Times New Roman"'><span
style='mso-tab-count:2'>       </span>V<sub>Z</sub>{H{M<sub>n+q</sub>}}<span
style='mso-tab-count:4'>                    </span>(ix)<o:p></o:p></span></p>

<p class=MsoNormal><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal style='margin-left:.25in;text-indent:-.25in;mso-text-indent-alt:
-.25in;mso-list:l33 level1 lfo21;mso-list-change:"%1\:7\:0\:\." "Christian Decker" 20040209T2204;
tab-stops:list .25in'><![if !supportLists]><span lang=EN-US>7.<span
style='font:7.0pt "Times New Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]><b style='mso-bidi-font-weight:normal'><span
lang=EN-US>STATUS-DELIVER</span></b><span lang=EN-US>: The second STATUS
operation is when the item is physically delivered. The current handling party
is set to AUTHORIZED, if B provides its public key K<sub>B</sub>, i.e. responds
to the eSeal’s challenge. Furthermore, without K<sub>B</sub>, procedure (viii)
is not possible. If (viii) is not possible, then a notification is issued by
the eSeal.</span></p>

<p class=MsoNormal style='text-indent:0in'><b style='mso-bidi-font-weight:normal'><span
lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></b></p>

<p class=MsoNormal><span lang=EN-US>Important to note that in implementations where
the microprocessor cannot support public key encryption, the eSeal challenge
will have to be based on a symmetric approach. This would entail an earlier
exchange of the eSeal secret key with the receiver and initiator, over a covert
channel.</span></p>

<p class=heading2><span lang=EN-US>4.3<span style="mso-spacerun: yes">  
</span>Technical Analysis and Realization</span><span lang=EN-US
style='font-weight:normal;mso-bidi-font-weight:bold'><o:p></o:p></span></p>

<p class=p1a><span lang=EN-US>Reflecting back at the system architecture
(Figure 2) the eSeal device is a central element of the eSeal system since this
device is responsible for detecting integrity violation of the sealed goods.
This section describes the technical details of the eSeal device and outlines
requirements to prevent successful attacks which compromise the device. From
section 3.1 the following functionalities are necessary in the eSeal device:
computation, communication and sensing. Additionally, the device is supported
by a power supply. The functionalities are implemented in different subsystems
requiring separate appropriate protection against attacks. The figure below
presents an overview about the components of an eSeal device. </span></p>

<p class=author style='margin-bottom:0in;margin-bottom:.0001pt'><span
lang=EN-US><!--[if gte vml 1]><v:shape id="_x0000_i1028" type="#_x0000_t75"
 style='width:153.75pt;height:149.25pt'>
 <v:imagedata src="./eSeal-Dateien/image007.png" o:title="smartisthardware"/>
</v:shape><![endif]--><![if !vml]><img border=0 width=205 height=199
src="./eSeal-Dateien/image008.jpg" v:shapes="_x0000_i1028"><![endif]></span></p>

<p class=figurelegend><b style='mso-bidi-font-weight:normal'><span lang=EN-US>Fig.
<span style='mso-field-code:"SEQ Fig\. \\n"'>4</span>.</span></b><span
lang=EN-US> Schema of an eSeal Device</span></p>

<p class=MsoNormal><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal><span lang=EN-US>All necessary computation functionality is
implemented in the microprocessor unit (MPU). The MPU covers the tasks of
cryptography (including de- and encryption, key management), permanent eSeal
state determination and sensor value processing. Therefore the MPU contains the
most sensitive data and present the most valuable attacking target. It is
required that no invasive or non-invasive method will gain knowledge about the
MPU’s internal states. This complicated protection task is discussed in [9].
The authors describe there several ways to read out protected data from MPUs on
SmartCards, but also effective countermeasures to those attacks<span
style="mso-spacerun: yes">  </span>Another requirement for the MPU is to hold a
state<span style="mso-spacerun: yes">  </span>within the MPU, which cannot be
reproduced by any method once lost. This internal MPU state includes the eSeal
device state and the integrity of the MPU itself. This state is wiped out of
the MPU as soon as a seal breach or an attack is detected and will ensure that
the seal cannot be reestablished. To our knowledge, there are currently two
preferred MPUs on the market which fulfill these requirements. The first one is
the DS5002FP [15] series from Dallas Semiconductor and the second one is the
IBM 4758 architecture[14]. Both support countermeasures described in [9] to
prevent non-invasive attacks. Additionally, both provide a protection of the
MPU against invasive attacks using a physical shielding, e.g. a membrane to
detect intrusion in order to avoid invasive attacks without notifications.
However, publications like [2] and [5] point out that apart from hardware
protection, the software layers in such processors need also be considered
carefully. Otherwise, protocol attacks can make the hardware protection
useless. </span></p>

<p class=MsoNormal><span lang=EN-US>The communication hardware itself does not
add further security vulnerability. The security tasks are part of the higher
level protocols. A destruction of the communication or denial-of-service attack
would prevent the receiver from reading the eSeal state. The receiver would
consider the eSeal to be absent. </span></p>

<p class=MsoNormal><span lang=EN-US>The sensors support the MPU to permanently
update the eSeal state. Those sensors reside outside the tamper-proof shield of
the MPU. The selection of the appropriate sensors generally depends on the
target application. Sensors have to be selected from the requirements of the
goods to be sealed and the required integrity situations. Outside the
tamper-proof area of the MPU, sensors face attacks including<span
style="mso-spacerun: yes">  </span>manipulation of sensor values during the
transport to the MPU or sensor cheating. In the latter case, the attacker tries
to maintain the valid sensor conditions during his attack through creating the
right environment in which the sensor is situated in. In order to accomplish
attacks to the data transport from the sensor to the MPU, the transport has to
be protected by either a physical protection such as shielding of cables and
the sensor itself or by the use of crypto protocols for the data transmission.
Latter will transform the sensor into another MPU based crypto system. One
possibility how this can be realized is described in [11] for secure keyboard
input in Next Generation Secure Computing Base (NGSCB) enabled computer. In
order to approach the threat of sensor cheating, the MPU can regularly check
the sensors’ health state. This requires the sensor to record its operation
conditions using further internal sensors of itself. This sensor-watches-sensor
scenario can be replaced by a seal-watches-seal scenario, where an eSeal device
can be supported by neighbored devices in order to verify its own reading. The
physical arrangement of the goods to be sealed together with the eSeal device
can also mechanically protect the sensors from an attacker. These
considerations have to be made before initializing the eSeal since they depend
heavily on the type of goods to seal and the expected attacks.</span></p>

<p class=MsoNormal><span lang=EN-US>The eSeal device needs power source
supplying all its components. In mobile scenarios, battery supply is
appropriate to allow independent operation. Currently, the battery life-time
determines the limits of the usage of an eSeal device since a power failure
leads to the lost of the state of the MPU and therefore leads to the state
“broken” in the eSeal device.</span></p>

<p class=heading1><span style='mso-ansi-language:DE'>5.<span
style="mso-spacerun: yes">   </span>Applications and </span><span lang=EN-US
style='layout-grid-mode:line'>Implementations</span><span style='mso-ansi-language:
DE'><o:p></o:p></span></p>

<p class=p1a><span lang=EN-US style='layout-grid-mode:line'>We have recently
started to implement the eSeal concept in various applications especially with
the focus on the scenarios which were the basis of the integrity classification
in section 2.1. One application for physical document integrity is considered
in more detail.</span><span style='mso-ansi-language:DE;layout-grid-mode:line'><o:p></o:p></span></p>

<p class=heading2><span style='mso-ansi-language:DE;layout-grid-mode:line'>5.1
General Implementation Details<o:p></o:p></span></p>

<p class=p1a><span lang=EN-US style='layout-grid-mode:line'>Implementations of
the eSeal devices are based on TecO's Smart-It Particle platform [3] providing
the necessary functionality like sensing, computing and wireless communication
of an eSeal device. Our eSeal prototype implementation adds more functionality
where needed using the Particles hardware and software interfaces. The roles of
initiator and receiver were taken over by regular personal computers.
Connection between the eSeal devices and the Internet enabled personal
computers are carried out via so-called XBridge devices which form a gateway
between the wireless eSeal network and the Internet. Such Xbridge devices are
installed at the site of initiators and receivers but also in certain
checkpoints. <o:p></o:p></span></p>

<p class=MsoNormal><span lang=EN-US>We developed a library and some hardware
extensions for the Particle platform, namely to include special sensors needed
for the eSeal applications. New software components focused on secure
communication using the blowfish algorithm. Although the eSeal system design
requires an asymmetric key algorithm, this will be available in the future
implementation. The additional hardware we developed are capacitive sensors to
supervise the integrity of compounds of goods. Using these kind of sensors we
also investigated possibilities to detect invasive physical attacks to the
eSeal device. Experiments are hereby still at the very beginning. Furthermore,
eSeal devices have access to already built-in Particle functionality like
Real-Time-Clock and the Cell-of-Origin location system[4].</span></p>

<p class=heading2><span lang=EN-US>5.2<span style="mso-spacerun: yes">  
</span>A first eSeal Application for Document Integrity</span></p>

<p class=p1a><span lang=EN-US>In office environments documents are usually
created in an electronic way. Nevertheless, for convenience or legal reasons
they are also printed on paper. The DigiClip [6] is a digitally enhanced paper
clip, which aims to bridge the gap between electronically created documents and
their physical paper-based representation. It was developed to keep the state
of an electronic document and its printed version consistent. Once clipped on a
printed document (Figure 5) it is able to keep track of document locations on a
room level granularity and to monitor various environmental and document
specific contexts. Currently, it can detect contexts like “document put in a
bag”, or “page from/to document removed/inserted”. </span></p>

<p class=MsoNormal><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

<p class=MsoNormal align=center style='text-align:center'><span lang=EN-US><!--[if gte vml 1]><v:shape
 id="_x0000_i1029" type="#_x0000_t75" style='width:280.5pt;height:186pt'
 fillcolor="window">
 <v:imagedata src="./eSeal-Dateien/image009.png" o:title="20030827-1426-45_Christian002"/>
</v:shape><![endif]--><![if !vml]><img border=0 width=374 height=248
src="./eSeal-Dateien/image010.jpg" v:shapes="_x0000_i1029"><![endif]></span></p>

<p class=figurelegend><b style='mso-bidi-font-weight:normal'><span lang=EN-US>Fig.
<span style='mso-field-code:"SEQ Fig\. \\n"'>5</span>.</span></b><span
lang=EN-US> DigiClip clipped on some Papers</span></p>

<p class=MsoNormal><span lang=EN-US>For the eSeal-based application the
DigiClip device monitors the conditional integrity and environmental integrity
of paper based document. We selected these two integrity situations because
they represent two crucial document characteristics: the togetherness of all
pages in a document and valid locations of a document. The device’s capacitive
sensor is able to detect the number of pages currently clipped and whether the
clip is opened or not. Like the electronic file of the document keeps all pages
within the document structure it is therewith possible to decide on the
physical document whether all pages are still together or a page left the
compound. The DigiClip’s cell-of-origin location system enables the definition
of areas where the printed document is allowed to stay. Like restrictions
applied on the electronic document denying for instance move operations it is
possible to apply such restrictions to the physical documents by limiting the
handling to certain areas. </span></p>

<p class=MsoBodyTextIndent3><span lang=EN-US>Our scenario for using the
DigiClip as an eSeal application was as follows: After an electronic document
was printed it had to be transported from the initiator to receiver represented
by personal computers in two different rooms. In between there were two
checkpoints the clip had to pass and one other it was not allowed to pass. The
initiator configured the DigiClip device to monitor the opening of the clip,
the page count and the DigiClip device’s locations along the path to the
receiver. Therewith, the eSeal was established around the physical document.
Its state was held in the memory of the Particle’s micro controller. As long as
the clip was not opened, the number of pages didn’t change and the DigiClip
device was on its way indicated by the checkpoints it has to pass, the
structural and environmental integrity of the document was assured, i.e. the
eSeal’s state was valid. During the operation the device constantly monitored
these integrity conditions. When the integrity was violated, meaning that the
clip was opened or it was seen by the third checkpoint, the eSeal state was set
to “broken” and reported back to the personal computers representing initiator
and the receiver via Xbridge gateways in the checkpoints. When the clipped
document reached its final destination the receiver personal computer queried
the DigiClip device and could conclude the eSeal’s state “valid” or “broken”.
All communication was encrypted using a symmetric blowfish algorithm because
the micro controller on the Smart-Its particles is not powerful enough to
practically implement advanced asymmetric algorithms like RSA. The shared
secret therefore had to be exchanged over a covert channel, and out-of-band
with respect to the device’s communications. Using this first implementation we
were able to detect both structural and environmental integrity breaches.</span></p>

<p class=heading1><span lang=EN-US>6.<span style="mso-spacerun: yes">  
</span>Related Work</span></p>

<p class=p1a><span lang=EN-US>There is other work which is related to our
approach of an eSeal. Siegemund and Flörkemeier describe in [13] a scenario of
smart product monitoring. Hereby, products are augmented with sensors to
monitor exceptions like dropping of the product. This is then communicated to
any mobile phone nearby without explicit pre-configuration. While the eSeal
shares the use of sensors for detecting exceptions, it goes beyond this
monitoring aspect. The eSeal state “valid” or “broken” is determined from
conditions during initialization and current conditions. Sensor measurements
are used to derive these current conditions. Further, the eSeal system design
guarantees that only authenticated parties are able to query the eSeal’s state
and further that manipulations on the eSeal device are recognized.</span></p>

<p class=MsoNormal><span lang=EN-US>The proliferation of electronic business
processes has fostered the need to integrate physical goods into the electronic
world. Especially in applications like supply chain management where goods are
distributed among many different players, which might be spread around the
world, it has become very important to electronically track such goods and to
electronically assure their integrity and authenticity. As a consequence first
electronic solutions like MacSema’s ButtonMemory[10], Elogicity’s eSeal [7],
Hi-G-Tek’s Active Hi-G-Seal[8] or Savi Technology’s SmartSeal [12], which claim
to seal physical goods, are available on the market. These solutions are based
on various technologies like electrical contact in case of the ButtonMemory,
RFID in case of Elogicity’s eSeal, and GPS support in case of the Active
Hi-G-Seal and the SmartSeal. They mainly provide some tracking feature that
makes it possible to monitor if your goods arrive at pre-defined checkpoints.
Additionally, one can conclude whether someone access the device or the goods
sealed by these solutions. Other integrity surveillance based on environmental
conditions for instance is not achieved. Furthermore, except for the Active
Hi-G-Seal, which uses 3DES, no other seal offers a secure communication. Our
eSeal approach covers a wider scope towards other integrity conditions as well
as a secure and authenticated communication to whom it is allowed to query the
eSeal’s state.</span></p>

<p class=MsoNormal><span lang=EN-US>IBM’s secure coprocessor, the IBM 4758, is
guaranteed to work in a secure manner despite physical attacks [6]. In contrast
to standard cryptographic accelerator chips this coprocessor puts cryptographic
secrets and a tamper detecting and responding circuitry in a secure box. Any
detected tamper event immediately results in loss of the cryptographic secrets.
Hence this coprocessor unit can be considered as a sealed object, for which the
integrity of condition is guaranteed. The scope of the seal is limited to the
detection of intrusions into the secure box surrounding the coprocessor unit.
Nevertheless the IBM 4758 can well serve as a hardware platform to built upon,
for some forms of specialized eSeals as we introduced them in this paper.</span></p>

<p class=heading1><span lang=EN-US>7.<span style="mso-spacerun: yes">  
</span>Conclusion and Future Work</span></p>

<p class=p1a><span lang=EN-US>The background, approach, design, operational
analysis and an applied example of the eSeal system have been presented in this
paper. It has been shown that electronic counterparts may uphold the function
of inert seals, in everyday applications. Furthermore, this primal
functionality is extended by incorporating sensors, communications and micro
processing, with the added capability of interaction with other information
systems.</span></p>

<p class=MsoNormal><span lang=EN-US>We foresee both economic and social impact
if such an architecture were to be taken up by industry, and we are actively
investigating such “take-up”, by forming research and development projects and
coalitions with industrial partners. Nevertheless, there is further work to do,
as the extremities of reference implementations of this architecture have not
been explored. There may be other application areas besides business and
commerce. Sensors, microchips and communications capabilities will continue to
evolve. Continuing experience commensurate with these developments will be
disseminated throughout the research community.</span></p>

<p class=heading1><span lang=EN-US>References</span></p>

<p class=referenceitem><em><span lang=EN-US style='font-style:normal'>1.<span
style='mso-tab-count:1'>  </span></span></em><span lang=EN-US>Anderson, A.
Security Engineering: A Guide to Building Dependable Distributed Systems.
Published by John Wiley &amp; Sons, 2001, ISBN 0-471-38922-6</span><span
style='mso-ansi-language:DE'><o:p></o:p></span></p>

<p class=referenceitem><span lang=EN-US>2.<span style='mso-tab-count:1'>  </span><em><span
style='font-style:normal'>Anderson, R., Kuhn, M.: Tamper Resistance - a
Cautionary Note. The Second USENIX Workshop on Electronic Commerce Proceedings</span></em>,
November 18-21, 1996. Oakland, California. pp 1-11, ISBN 1-880446-83-9 </span><span
style='mso-ansi-language:DE'><o:p></o:p></span></p>

<p class=referenceitem><span lang=EN-US>3.<span style='mso-tab-count:1'>  </span>Beigl,
M., Zimmer, T., Krohn, A., Decker, C., Robinson, P.: Smart-Its - Communication
and Sensing Technology for UbiComp Environments. Technical Report ISSN
1432-7864 2003/2</span></p>

<p class=referenceitem><span lang=EN-US>4.<span style='mso-tab-count:1'>  </span>Beigl,
M., Zimmer, T., Decker, C.: A Location Model for Communicating and Processing
of Context. Personal and Ubiquitous Computing Vol. 6 Issue 5-6, pp. 341-357,
ISSN 1617-4909, 2002</span></p>

<p class=referenceitem><span lang=EN-US>5.<span style='mso-tab-count:1'>  </span>Bond,
M.: Attacks on Cryptoprocessor Transaction Sets, Workshop on Cryptographic
Hardware and Embedded Systems (CHES2001), 31st January 2001, Paris.</span></p>

<p class=referenceitem><span lang=EN-US>6.<span style='mso-tab-count:1'>  </span>Decker,
C., Beigl, M., Eames, A., Kubach, U. DigiClip: Applying electronic properties
to physical documents. To appear in the Proceedings of the IWSAWC 2004, March
23<sup>rd</sup> 2004, Tokyo.</span></p>

<p class=referenceitem><span lang=EN-US>7.<span style='mso-tab-count:1'>  </span>elogicity.com
global track and trace solutions to all parties within the supply chain
management process Available Online: http://www.elogicity.com/solutions.htm
[Accessed: 07/11/2003]</span></p>

<p class=referenceitem><span lang=EN-US>8.<span style='mso-tab-count:1'>  </span>Hi-G-Tek:
Secured Cargo. Available Online: http://www.higtek.com/cargo2.htm [Accessed:
08/02/2004]</span></p>

<p class=referenceitem><span style='mso-ansi-language:DE'>9.<span
style='mso-tab-count:1'>  </span></span><span lang=EN-US>Koemmerling, O., Kuhn,
M.: Design Principles for Tamper-Resistant Smartcard Processors. <span class=m>Proceedings
of the USENIX Workshop on SmartCard Technology,<span style="mso-spacerun:
yes">  </span>10-11 May 1999, Chicago, USA.</span></span></p>

<p class=referenceitem><span lang=EN-US>10.<span style='mso-tab-count:1'>           </span>MacSema
Inc.: MemoryButton Technology. Available Online:
http://www.macsema.com/solutions.htm [Accessed: 08/02/2004]</span></p>

<p class=referenceitem><span lang=EN-US>11.Microsoft: Hardware Platform for the
Next-Generation Secure Computing Base. Available Online:
http://www.microsoft.com/resources/ngscb/documents/NGSCBhardware. doc
[Accessed: 08/02/2004]</span></p>

<p class=referenceitem><span lang=EN-US>12.<span style='mso-tab-count:1'>           </span>Savi
Technology: Securing the Smart Supply Chain. Available Online:
http://www.savi.com [Accessed: 07/11/2003]</span></p>

<p class=referenceitem><span lang=EN-US>13.Siegemund, F., Flörkemeier, C.:
Interaction in Pervasive Computing Settings using Bluetooth-enabled Active Tags
and Passive RFID Technology together with Mobile Phones. In Proceedings of IEEE
PerCom 2003 (IEEE International Conference on Pervasive Computing and
Communications), March 2003, Fort Worth, USA.</span></p>

<p class=referenceitem><span lang=EN-US>14.Smith, S.W., Weingart, S.H.:
Building a High-Performance, Programmable Secure Coprocessor. In Computer
Networks, Special Issue on Computer Network Security, Vol. 31, pp. 831-860.
April 1999.</span></p>

<p class=referenceitem><span lang=EN-US>15.Dallas Semiconductor: Datasheet to
Secure Microprocessor DS5002FP. Available Online:
http://pdfserv.maxim-ic.com/en/ds/DS5002FP.pdf [Accessed: 08/02/2004]</span></p>

<p class=p1a><span lang=EN-US><![if !supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></p>

</div>

</body>

</html>
