[Impressum] [E-Mail]

Modeling the German Electronic Health Card (EGK) (1)

The first step is to describe the components and user of the application, the communication infrastructure and the attacker abilities.
The nodes of the deployment diagram show the participants (i.e. user and components) of the application. The communication paths show which components communicate with each other. E.g. the patient communicates with the Arzt-PC to enter his PIN. The communication paths are annotated with Stereotype <<Threat>> if the attacker is able to interfere the communication of this channel. In this case study we assume that an attacker has full access (i.e. read, send and suppress messages) that are exchanged between a smartcard and a terminal or between a terminal and a service. All other communication channels, i.e. the ones between the user and the terminals, are not attacked. They represent the communication of a user with a terminal, e.g. via a graphical user interface. We assume that no attacker is standing behind e.g. a doctor in a doctor's office and reading the data that the doctor is entering into its PC.

        DD


Back, Next Step: Class Diagrams of the application