THE DIFFICULTY OF STANDARDIZING SMART CARD SECURITY EVALUATION

被引:0
|
作者
JOSANG, A [1 ]
机构
[1] NORWEGIAN INST TECHNOL,N-7034 TRONDHEIM,NORWAY
关键词
SECURITY EVALUATION; SMART CARDS; SECURITY VALIDATION; ASSURANCE; ITSEC; SECURITY THROUGH OBSCURITY; STANDARDS; ILLEGAL CLONING;
D O I
10.1016/0920-5489(95)00013-K
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a need for assessing the security of smart cards by an independent third party, specially if multi-application smart cards become reality. Intuitively, the methods to obtain this could be derived from the computer industry where security evaluation already is commonplace, but because of the special properties of smart cards, this seems very difficult. This article discusses the problems related to this topic, and makes suggestions on how security evaluation of smart cards can be achieved.
引用
收藏
页码:333 / 341
页数:9
相关论文
共 50 条
  • [1] A study on smart card security evaluation criteria for side channel attacks
    Lee, H
    Ahn, M
    Lim, S
    Moon, S
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 517 - 526
  • [2] Hardwaresicherheit von Smart Card ICsHardware security of smart-card ICs
    S. Philipp
    e&i Elektrotechnik und Informationstechnik, 2001, 118 (10) : 477 - 480
  • [3] Study on the security in smart card system
    Chen, Youlei
    Wang, Zhangyi
    Zhang, Huanguo
    Jisuanji Gongcheng/Computer Engineering, 2002, 28 (07):
  • [4] Editorial: Smart Card and RFID Security
    Cheng, L. M.
    Wong, K. W.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2013, 18 (2-3) : 97 - 97
  • [5] The Security Email Based on Smart Card
    Zhang Lina
    Meng Hai Jiang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 1634 - 1639
  • [6] Security scheme based on smart card
    Shen, Wei
    Chen, Chun
    Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [7] The Czech social security smart card
    Hybl, H
    SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 197 - 203
  • [8] Trend of smart card (IC card) in security fields in Japan
    Kosugi, S
    NEC RESEARCH & DEVELOPMENT, 2002, 43 (03): : 208 - 212
  • [9] Security evaluation schemas for the public and private market with a focus on smart card systems
    von Faber, E
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, 1999, 1717 : 187 - 203
  • [10] On Construction of Signcryption Scheme for Smart Card Security
    Kar, Jayaprakash
    Alghazzawi, Daniyal M.
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 109 - 113