Login / Signup
Formal security policy models for smart card evaluations.
Gerd Beuster
Karin Greimel
Published in:
SAC (2012)
Keyphrases
</>
smart card
security policies
security requirements
access control
distributed systems
sensitive data
java card
data mining
process model
network security
conflict resolution
security concerns
remote user authentication scheme