A proposal of appropriate evaluation scheme for exchangeable cas (XCAS)

Yu Na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A conditional access system (CAS) only allows appropriate users to get access to contents. The advent of exchangeable CAS (XCAS) that updated version of CAS is developed. But the standards or evaluation schemes for XCAS are absent, so many interoperability problems among XCAS of each company may have to be occurred. Therefore, a specific scheme that can evaluate the security and suitability of exchangeable conditional access systems has been requested. In this paper, we propose an appropriate evaluation scheme for XCAS. The evaluation scheme includes an evaluation purpose and four components to evaluate the evaluation target, the evaluation process, the evaluation subject, and the evaluation cost involved.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 6th International Conference, ISPEC 2010, Proceedings
Pages217-228
Number of pages12
DOIs
Publication statusPublished - 2010
Event6th International Conference on Information Security Practice and Experience, ISPEC 2010 - Seoul, Korea, Republic of
Duration: 2010 May 122010 May 13

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6047 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th International Conference on Information Security Practice and Experience, ISPEC 2010
CountryKorea, Republic of
CitySeoul
Period10/5/1210/5/13

Keywords

  • CC
  • CMVP
  • Common criteria
  • Conditional access system
  • DCAS
  • Downloadable CAS
  • EMV
  • Exchangeable CAS
  • PCIDSS
  • XCAS

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A proposal of appropriate evaluation scheme for exchangeable cas (XCAS)'. Together they form a unique fingerprint.

  • Cite this

    Hwang, Y. N., Jeong, H., Cho, S., Kim, S., Won, D., & Kim, S. (2010). A proposal of appropriate evaluation scheme for exchangeable cas (XCAS). In Information Security Practice and Experience - 6th International Conference, ISPEC 2010, Proceedings (pp. 217-228). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6047 LNCS). https://doi.org/10.1007/978-3-642-12827-1_16