Abstract
The immense advances in the area of information technology and more specifically in the fabrication techniques of integrated circuits, has allowed the manufacturing of Smart Cards that feature processing capabilities through an embedded microprocessor, erasable memory and a variety of security features through the execution of cryptographic algorithms. This paper presents the main functional, architectural and security characteristics of a smart card pilot application for an Educational Institute, together with the resulting benefits for both the students and the institute. A detailed description of the way that the smart card security features have been capitalised for implementing certification and authentication mechanisms is also provided.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
Similar content being viewed by others
References
Bruce Schneier, Adam Shostack, “Breaking Up is Hard to Do: Modelling Security Threats for Smart Cards”, Proceedings of USENIX Workshop on Smart Card Technology, Chicago May 1999, pp. 175–185.
Bull CP8 “Operating Systems - Security Modules”,Ref: TU 0208 A01, 1992, France.
Bull CP8, “Smart Cards User Guide”,Ref: TU 0221 A01, 1993, Bull CP8, France.
C. Markantonakis, “The case for a Secure Multi-Application Smart Card Operating System”, Information Security Workshop 97 (ISW97), September 1997, Springer-Verlag (LNCS 1396 ), pp. 188–197.
Carol Hovenga Fancher, “In your pocket: Smartcards”,IEEE Spectrum, February 1997.
European Telecommunications Standards Institute, “Digital Cellular telecommunication systems, Specification of the Subscriber Identity Module - Mobile Equipment (SIM-ME) interface”,ETSI GSM 11.14.
Gritzalis D., Katsikas S., “Towards a formal system-to-system authentication protocol”, Computer Communications, Vol. 19, no. 8, pp. 954–971, 1996.
International Organization for Standardization, “Identification Cards - Integrated Circuit Cards with Contacts”,ISO 7816.
Jose Luis Zoreda, Jose Manuel Oton, “Smart Cards”, Artech House Inc., 1994.
Katsikas S., Gritzalis D. Spirakis P., “Attack modeling in open network environments”, in Proc. of the 2nd IFIP Communications and Multimedia Security Conference, pp. 268–277, Chapman & Hall 1996.
Labuschagne L., Eloff J., “The use of real-time risk analysis to enable dynamic activation of countermeasures”, Computers & Security, Vol. 17, no. 4, pp. 347–357, 1998.
Louis Guillou, Michel Ugon, Jean Quisquater, “The Smart Card: A standardized security device dedicated to public cryptology”, Contemporary Cryptology. The Science of Information Integrity, ed. G.J. Simmons, IEEE Press 1992, pp. 561–613.
Michael C. McChesney, “Banking in cyberspace: an investment in itself’, IEEE Spectrum, February 1997, pp. 54–59.
Naomaru Itoi, Peter Honeyman, “Smartcard Integration with Kerberos V5”, Proceedings of the USENIX Workshop on Smart Card Technology, Chicago, May 1999, pp. 51–62.
Tom Verschuren, “Smart access: strong authentication on the web”,Computer Networks and ISDN Systems, 30, 1998, pp. 1511–1519.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Lambrinoudakis, C. (2000). Using Smart Cards in an Educational Environment. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_14
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive