• DocumentCode
    540263
  • Title

    Requirements driven methodology for assessing the security and business uses of smart cards

  • Author

    May, T.T. ; James, J.W. ; Bosma, P.H. ; Veatch, J.D.

  • fYear
    1996
  • fDate
    2-4 Oct. 1996
  • Firstpage
    72
  • Lastpage
    88
  • Abstract
    This paper describes a methodology by which security and other business functions can be assessed for the potential application of smart card technology. The assessment goal is to answer the question, “Does it make good business sense to invest money in this technology for this particular business?” This methodology addresses the potential application of smart card technology to major organizations or functions and activities within a corporate entity
  • Keywords
    access control; security of data; smart cards; business uses; corporate entity; requirements driven methodology; security; smart cards;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology, 1996. 30th Annual 1996 International Carnahan Conference
  • Conference_Location
    Lexington, Kentucky, USA
  • Print_ISBN
    0-7803-3537-6
  • Type

    conf

  • DOI
    10.1109/CCST.1996.551845
  • Filename
    5726985