TY - JOUR
T1 - Study on the common criteria methodology for secure ubiquitous environment construction
AU - Kang, Soo Young
AU - Park, Jong Hyuk
AU - Khurram Khan, Muhammad
AU - Kwak, Jin
PY - 2012/8
Y1 - 2012/8
N2 - The ubiquitous environment has been developed since the extension of IT technology. The term 'Ubiquitous' is referred firstly by Mark Weiser, which means the user based environment that provides network service 'any time, anywhere'. In the ubiquitous environment, the computing environment should have the device that recognizes the user and the environment. But there is not a verification process when dealing in sensitive information, and it may cause serious errors or malfunction. In order to complement the problem, members of the CCRA utilized CC(Common Criteria) to build up an assessment system and create a secured ubiquitous environment.
AB - The ubiquitous environment has been developed since the extension of IT technology. The term 'Ubiquitous' is referred firstly by Mark Weiser, which means the user based environment that provides network service 'any time, anywhere'. In the ubiquitous environment, the computing environment should have the device that recognizes the user and the environment. But there is not a verification process when dealing in sensitive information, and it may cause serious errors or malfunction. In order to complement the problem, members of the CCRA utilized CC(Common Criteria) to build up an assessment system and create a secured ubiquitous environment.
KW - Common criteria
KW - RFID
KW - Sensor
KW - Ubiquitous environment
UR - http://www.scopus.com/inward/record.url?scp=84865217676&partnerID=8YFLogxK
U2 - 10.1007/s10845-009-0363-x
DO - 10.1007/s10845-009-0363-x
M3 - Article
AN - SCOPUS:84865217676
SN - 0956-5515
VL - 23
SP - 933
EP - 939
JO - Journal of Intelligent Manufacturing
JF - Journal of Intelligent Manufacturing
IS - 4
ER -