Share Email Print
cover

Proceedings Paper

Trends in security evaluations
Author(s): Jan Pieters
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Security evaluations are carried out for several reasons. They can be used for product improvement, in a risk analysis, or they can be used to verify the security claims or targets. Using a simplified design process scheme it is explained where, and to what extent security evaluations can be useful. Depending on the anticipated risk, or the trust the parties involved (manufacturers, users, or issuers) have in certain security related products, different sorts of evaluation can be carried out. The goals and the assumptions made for the different sorts of evaluation are discussed, as well as the relation between the sorts of evaluation. An important tool in evaluating security systems is the matrix security model. This model is discussed in some detail.

Paper Details

Date Published: 15 March 1996
PDF: 7 pages
Proc. SPIE 2659, Optical Security and Counterfeit Deterrence Techniques, (15 March 1996); doi: 10.1117/12.235463
Show Author Affiliations
Jan Pieters, TNO Ctr. for Evaluation of Instrumentation and Security Techniques (Netherlands)


Published in SPIE Proceedings Vol. 2659:
Optical Security and Counterfeit Deterrence Techniques
Rudolf L. van Renesse, Editor(s)

© SPIE. Terms of Use
Back to Top