DocumentCode
540263
Title
Requirements driven methodology for assessing the security and business uses of smart cards
Author
May, T.T. ; James, J.W. ; Bosma, P.H. ; Veatch, J.D.
fYear
1996
fDate
2-4 Oct. 1996
Firstpage
72
Lastpage
88
Abstract
This paper describes a methodology by which security and other business functions can be assessed for the potential application of smart card technology. The assessment goal is to answer the question, “Does it make good business sense to invest money in this technology for this particular business?” This methodology addresses the potential application of smart card technology to major organizations or functions and activities within a corporate entity
Keywords
access control; security of data; smart cards; business uses; corporate entity; requirements driven methodology; security; smart cards;
fLanguage
English
Publisher
ieee
Conference_Titel
Security Technology, 1996. 30th Annual 1996 International Carnahan Conference
Conference_Location
Lexington, Kentucky, USA
Print_ISBN
0-7803-3537-6
Type
conf
DOI
10.1109/CCST.1996.551845
Filename
5726985
Link To Document