Skip to main content

Development of an Ontology-Based Smart Card System Reference Architecture

Interoperability based on ontology concept

  • Chapter
Ontologies

Part of the book series: Integrated Series in Information Systems ((ISIS,volume 14))

  • 2467 Accesses

Abstract

In the information society the security of information during access and communication has of basic importance. Smart cards (SC) can integrate security services and the actual application functions, so they are perfect tool to fulfill the role of the key of information society. As there is extremely high number of different smart card applications developed individually, connecting these systems, their interoperability is a growing problem. An additional problem is that the combination of functions on one card needs the thorough configuration of the smart card software. Because of the frequent changes in the SC applications during the life cycle of the card, there is a more frequent need for the reconfiguration of the card software as well. A structured, general description, reference architecture of the smart card system elements and the possible relations among them could support the interoperability and configuration/ reconfiguration in a great extent. The chapter gives a short overview on smart card systems and applications, and introduces ontology — based smart card reference architecture and an smart card attack tree.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Bruce Schneier: Attack Trees — Modeling security threats. Dr. Dobb’s Journal, December 1999. pp. 318–333, (February 17, 2005); http://www.schneier.com/paper-attacktrees-ddjft.html.

    Google Scholar 

  • Denny Michael, Ontology Building: A Survey of Editing Tools, (February 17, 2005); http://www.xml.com/pub/a/2002/11/06/ontologies.html.

    Google Scholar 

  • Gruber, T. R., A translation approach to portable ontologies. Knowledge Acquisition, 5(2):199–220, 1993.

    Article  Google Scholar 

  • Jones, D., Bench-Capon, T., and Visser, P. Methodologies for ontology development, XV. IFIP World Computer Congress, Vienna/Austria and Budapest/Hungary, 31 August — 4 September, 1998, CD-ROM Edition.

    Google Scholar 

  • KBSI 1994, The IDEF5 Ontology Description Capture Method Overview, KBSI Report, Texas.

    Google Scholar 

  • NICSS group, NICSS-Framework Scheme, (February 17, 2005); http://www.nicss.gr.jp/.

    Google Scholar 

  • NIST, Government Smart Card Interoperability Specification (GSC-IS), Version 2.1, Interagency Report 6887 — 2003 Edition, July 16, 2003, (February 17, 2005); http://www.incits.org/tc_home/m1htm/docs/m1030398.pdf.

    Google Scholar 

  • OilED, (February 17, 2005); http://oiled.man.ac.uk/.

    Google Scholar 

  • OntoEdit, (February 17, 2005); http://www.ontoprise.com.

    Google Scholar 

  • Open Smart Card Infrastructure for Europe, V2, Volume 3: Global Interoperability Framework for identification, authentication and electronic signature (IAS) with smart cards, Part 1: Contextual and Conceptual Modeling, Authors: eESC GIF Expert Group, OSCIE Volume 3 Part 1 (March 2003), (February 17, 2005); http://www.eeuropesmartcards.org/Download/03-1.PDF.

    Google Scholar 

  • Terrance R. Ingoldsby: Understanding Risk Through Attack Tree Analysis, CSI Computer Security Journal, Spring 2004, Volume XX, Number 2. pp 33–59, (February 17, 2005); http://www.amenaza.com/request_methodology.html.

    Google Scholar 

  • The Ontopia Knowledge Suite, (February 17, 2005); http://www.ontopia.net.

    Google Scholar 

  • University of Karlsruhe, Karlsruhe Ontology (KAON) Tool Suite, (February 17, 2005); http://kaon.semanticweb.org.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Mezgár, I., Kincses, Z. (2007). Development of an Ontology-Based Smart Card System Reference Architecture. In: Sharman, R., Kishore, R., Ramesh, R. (eds) Ontologies. Integrated Series in Information Systems, vol 14. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-37022-4_30

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-37022-4_30

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-37019-4

  • Online ISBN: 978-0-387-37022-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics