DocumentCode :
540263
Title :
Requirements driven methodology for assessing the security and business uses of smart cards
Author :
May, T.T. ; James, J.W. ; Bosma, P.H. ; Veatch, J.D.
fYear :
1996
fDate :
2-4 Oct. 1996
Firstpage :
72
Lastpage :
88
Abstract :
This paper describes a methodology by which security and other business functions can be assessed for the potential application of smart card technology. The assessment goal is to answer the question, “Does it make good business sense to invest money in this technology for this particular business?” This methodology addresses the potential application of smart card technology to major organizations or functions and activities within a corporate entity
Keywords :
access control; security of data; smart cards; business uses; corporate entity; requirements driven methodology; security; smart cards;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 1996. 30th Annual 1996 International Carnahan Conference
Conference_Location :
Lexington, Kentucky, USA
Print_ISBN :
0-7803-3537-6
Type :
conf
DOI :
10.1109/CCST.1996.551845
Filename :
5726985
Link To Document :
بازگشت