Abstract
In the information society the security of information during access and communication has of basic importance. Smart cards (SC) can integrate security services and the actual application functions, so they are perfect tool to fulfill the role of the key of information society. As there is extremely high number of different smart card applications developed individually, connecting these systems, their interoperability is a growing problem. An additional problem is that the combination of functions on one card needs the thorough configuration of the smart card software. Because of the frequent changes in the SC applications during the life cycle of the card, there is a more frequent need for the reconfiguration of the card software as well. A structured, general description, reference architecture of the smart card system elements and the possible relations among them could support the interoperability and configuration/ reconfiguration in a great extent. The chapter gives a short overview on smart card systems and applications, and introduces ontology — based smart card reference architecture and an smart card attack tree.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bruce Schneier: Attack Trees — Modeling security threats. Dr. Dobb’s Journal, December 1999. pp. 318–333, (February 17, 2005); http://www.schneier.com/paper-attacktrees-ddjft.html.
Denny Michael, Ontology Building: A Survey of Editing Tools, (February 17, 2005); http://www.xml.com/pub/a/2002/11/06/ontologies.html.
Gruber, T. R., A translation approach to portable ontologies. Knowledge Acquisition, 5(2):199–220, 1993.
Jones, D., Bench-Capon, T., and Visser, P. Methodologies for ontology development, XV. IFIP World Computer Congress, Vienna/Austria and Budapest/Hungary, 31 August — 4 September, 1998, CD-ROM Edition.
KBSI 1994, The IDEF5 Ontology Description Capture Method Overview, KBSI Report, Texas.
NICSS group, NICSS-Framework Scheme, (February 17, 2005); http://www.nicss.gr.jp/.
NIST, Government Smart Card Interoperability Specification (GSC-IS), Version 2.1, Interagency Report 6887 — 2003 Edition, July 16, 2003, (February 17, 2005); http://www.incits.org/tc_home/m1htm/docs/m1030398.pdf.
OilED, (February 17, 2005); http://oiled.man.ac.uk/.
OntoEdit, (February 17, 2005); http://www.ontoprise.com.
Open Smart Card Infrastructure for Europe, V2, Volume 3: Global Interoperability Framework for identification, authentication and electronic signature (IAS) with smart cards, Part 1: Contextual and Conceptual Modeling, Authors: eESC GIF Expert Group, OSCIE Volume 3 Part 1 (March 2003), (February 17, 2005); http://www.eeuropesmartcards.org/Download/03-1.PDF.
Terrance R. Ingoldsby: Understanding Risk Through Attack Tree Analysis, CSI Computer Security Journal, Spring 2004, Volume XX, Number 2. pp 33–59, (February 17, 2005); http://www.amenaza.com/request_methodology.html.
The Ontopia Knowledge Suite, (February 17, 2005); http://www.ontopia.net.
University of Karlsruhe, Karlsruhe Ontology (KAON) Tool Suite, (February 17, 2005); http://kaon.semanticweb.org.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Mezgár, I., Kincses, Z. (2007). Development of an Ontology-Based Smart Card System Reference Architecture. In: Sharman, R., Kishore, R., Ramesh, R. (eds) Ontologies. Integrated Series in Information Systems, vol 14. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-37022-4_30
Download citation
DOI: https://doi.org/10.1007/978-0-387-37022-4_30
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-37019-4
Online ISBN: 978-0-387-37022-4
eBook Packages: Computer ScienceComputer Science (R0)