๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Smartcards: world access

โœ Scribed by Helen Meyer


Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
126 KB
Volume
16
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

โœฆ Synopsis


Smartcards: world access, Joe Paone. Mobile users dream of universal access to their networked desktops. Being able to log on to your own system fi-om a PC in a remote site and see your familiar interface, applications, and data could be a productivity enhancer as well as a convenience. For network managers, on the other hand, ubiquitous access without guaranteed security would be a nightmare. The digital certificate on a smartcard contains relevant information about the user that is necessary for proper authentication and authorization. The card can be used to provide encryption, Because the smartcard is physically separate from any PC, accessing a computer through a smartcard reader device, secure access becomes portable. Users can log on anywhere from any machine and gain access to the information and services for which they are authorized. Many companies' Internet commerce plans have a lot riding on the success of smartcards. For most network managers not in charge of commerce servers, the smartcard could enable remote, mobile and even in-house employees to authenticate themselves and encrypt data sent to or over the network with a swipe card. However, some industry experts feel that the widespread roll-out of smartcards and digital certificates in enterprise networks is probably a minimum of two years away.


๐Ÿ“œ SIMILAR VOLUMES


Smartcards
โœ Ben McClure ๐Ÿ“‚ Article ๐Ÿ“… 1998 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 45 KB
Smartcard certification
โœ David Cherrill ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 260 KB

Smartcards provide significantly better access control to the data stored on them than for instance magnetic-stripe cards. However, the level of protection provided against well-equipped attackers is frequently overestimated. Application designers must consider that skilled attackers can use various

Smartcards outsmart computer crime
โœ Ken J. Fifield ๐Ÿ“‚ Article ๐Ÿ“… 1989 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 773 KB
Mitigating smartcard risks
โœ Ken Ayer ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 255 KB

Given the potential risks involved in the use of smartcards, a smartcard designer will naturally want to build high confidence into the security of the product. One way to achieve this is to aim for certification to the highest ITSEC level: E6. This is not a decision to be taken lightly: E6 is dit~i