06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3<br />

Smart Card Ownership <strong>Model</strong>s<br />

Contents<br />

3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52<br />

3.2 Issuer <strong>Centric</strong> Smart Card Ownership <strong>Model</strong> (ICOM) . . . . . 53<br />

3.3 Frameworks <strong>for</strong> the ICOM . . . . . . . . . . . . . . . . . . . . . . 57<br />

3.4 <strong>User</strong> <strong>Centric</strong> Smart Card Ownership <strong>Model</strong> (UCOM) . . . . . 65<br />

3.5 <strong>Security</strong> and Operational Requirements of the UCOM . . . . . 70<br />

3.6 Coopetitive Architecture . . . . . . . . . . . . . . . . . . . . . . . 76<br />

3.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78<br />

In this chapter, we open the discussion with a description of the ICOM framework and the<br />

security and operational assumptions adopted in the ICOM, along with a short introduction<br />

to the widely deployed smart card frameworks which support the ICOM. We then provide an<br />

overview of the <strong>User</strong> <strong>Centric</strong> Smart Card Ownership <strong>Model</strong> (UCOM) and its major stakeholders.<br />

The discussion then moves to the security and operational requirements of UCOM<br />

stakeholders. We then extend the UCOM model to include an administrative authority that<br />

manages the UCTD while providing the user with freedom of choice. This model is referred<br />

to as the Coopetitive Architecture <strong>for</strong> Smart Cards (CASC).<br />

51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!