A Study on Evaluation Scheme for Exchangeable CAS (XCAS) |
Hwang, Yu-Na
(성균관대학교 전자전기컴퓨터공학과)
Jeong, Han-Jae (성균관대학교 휴대폰학과) Won, Dong-Ho (성균관대학교 정보통신공학) Kim, Seung-Joo (성균관대학교 정보통신공학부) |
1 | NIST, “FIPS 140-2: SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES,” May, 2001. |
2 | EMVCo, LLC. “EMVCo Type Approval – Contact Terminal Level 1 – Administrative Process Version 5.0”, January 2009 |
3 | EMVCo, LLC. “EMVCo Type Approval – Contact Terminal Level 2 – Administrative Process Version 2.0,” January, 2009. |
4 | PCI Security Standard Council, “Payment Card Industry (PCI) Data Security Standard: Requirements and Security Assessment Procedures Version 1.2.1,” July, 2009. |
5 | Digital Cinema Initiatives, LLC, “Digital Cinema System Specification Compliance Test Plan Version 1.1,” May, 2009. |
6 | Digital Cinema Initiatives, LLC, “Digital Cinema System Specification Version 1.2,” March, 2008. |
7 | 국내.외 암호모듈 검증정책, IT보안인증사무국. |
8 | 국가정보원 2009. 3. 20 정보보호제품 평가.인증 수행규정. |
9 | 한국정보보호진흥원,“신청인을 위한 정보보호시스템 평가수수료 산정가이드”, 2008, 7. |
10 | 황유나, 정한재, 조성규, 김송이, 원동호, 김승주, “다운로드형 수신제한시스템(XCAS)에 적합한 평가체계 제안”, 한국 소프트웨어공학 동계학술대회(KCSE 2010)논문집, pp.192-198, 2010.02.08-10. |
11 | Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won and Seungjoo Kim, “A proposal of appropriate evaluation scheme for exchangeable CAS (XCAS),” Information Security Practice and Experience Conference (ISPEC 2010), Seoul, Korea, March 12-13, 2010, pp.217-228. |
12 | OpenCableTM Technical Reports, “DCAS System Overview Technical Report”, OC-TR-DCAS-D02-060912, 2006. |
13 | NCTA, “Report of the National Cable & Telecommunications Association on Downloadable Security”, 2005. |
14 | ISO/IEC 15408-1, “Information technology - Security techniques - Evaluation criteria for IT security - Part 1:Introduction and general model” |
15 | ISO/IEC 15408-3, “Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements” |
16 | ISO/IEC 15408-2, “Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements” |