Skip to main content

A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS),

  • Conference paper
Information Security, Practice and Experience (ISPEC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6047))

  • 660 Accesses

Abstract

A conditional access system (CAS) only allows appropriate users to get access to contents. The advent of exchangeable CAS (XCAS) that updated version of CAS is developed. But the standards or evaluation schemes for XCAS are absent, so many interoperability problems among XCAS of each company may have to be occurred. Therefore, a specific scheme that can evaluate the security and suitability of exchangeable conditional access systems has been requested. In this paper, we propose an appropriate evaluation scheme for XCAS. The evaluation scheme includes an evaluation purpose and four components to evaluate the evaluation target, the evaluation process, the evaluation subject, and the evaluation cost involved.

“This research was supported by the MKE(Ministry of Knowledge Economy), Korea, under the ITRC(Information Technology Research Center) support program supervised by the NIPA(National IT Industry Promotion Agency)” (NIPA-2009-(C1090-0902-0016)).

This work was supported by Defense Acquisition Program Administration and Agency for Defense Development under the contract UD070054AD.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. OpenCableTM Technical Reports, DCAS System Overview Technical Report, OC-TR-DCAS-D02-060912 (2006)

    Google Scholar 

  2. NCTA DCAS Report to FCC (November 2005)

    Google Scholar 

  3. http://www.opencable.com/dcas

  4. http://www.klabs.re.kr

  5. ISO/IEC 15408-1, Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model

    Google Scholar 

  6. ISO/IEC 15408-2, Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements

    Google Scholar 

  7. ISO/IEC 15408-3, Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements

    Google Scholar 

  8. NIST, FIPS 140-2: Security Requirements For Cryptographic Modules (May 2001)

    Google Scholar 

  9. http://www.nist.gov

  10. http://www.kisa.or.kr

  11. http://www.niap-ccevs.org

  12. http://www.emvco.com

  13. EMVCo, LLC. EMVCo Type Approval – Contact Terminal Level 1 – Administrative Process Version 5.0 (January 2009)

    Google Scholar 

  14. EMVCo, LLC. EMVCo Type Approval – Contact Terminal Level 2 – Administrative Process Version 2.0 (January 2009)

    Google Scholar 

  15. https://www.pcisecuritystandards.org

  16. PCI Security Standard Council, Payment Card Industry (PCI) Data Security Standard: Requirements and Security Assessment Procedures Version 1.2.1 (July 2009)

    Google Scholar 

  17. http://www.dcimovies.com

  18. Digital Cinema Initiatives, LLC, Digital Cinema System Specification Compliance Test Plan Version 1.1 (May 2009)

    Google Scholar 

  19. Digital Cinema Initiatives, LLC, Digital Cinema System Specification Version 1.2 (March 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hwang, Yn., Jeong, H., Cho, S., Kim, S., Won, D., Kim, S. (2010). A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS),. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds) Information Security, Practice and Experience. ISPEC 2010. Lecture Notes in Computer Science, vol 6047. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12827-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12827-1_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12826-4

  • Online ISBN: 978-3-642-12827-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics