Paper
15 March 1996 Trends in security evaluations
Jan Pieters
Author Affiliations +
Proceedings Volume 2659, Optical Security and Counterfeit Deterrence Techniques; (1996) https://doi.org/10.1117/12.235463
Event: Electronic Imaging: Science and Technology, 1996, San Jose, CA, United States
Abstract
Security evaluations are carried out for several reasons. They can be used for product improvement, in a risk analysis, or they can be used to verify the security claims or targets. Using a simplified design process scheme it is explained where, and to what extent security evaluations can be useful. Depending on the anticipated risk, or the trust the parties involved (manufacturers, users, or issuers) have in certain security related products, different sorts of evaluation can be carried out. The goals and the assumptions made for the different sorts of evaluation are discussed, as well as the relation between the sorts of evaluation. An important tool in evaluating security systems is the matrix security model. This model is discussed in some detail.
© (1996) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jan Pieters "Trends in security evaluations", Proc. SPIE 2659, Optical Security and Counterfeit Deterrence Techniques, (15 March 1996); https://doi.org/10.1117/12.235463
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Manufacturing

Systems modeling

Product engineering

Inspection

Instrument modeling

Optics manufacturing

RELATED CONTENT

The Need For Second-Generation Gaging
Proceedings of SPIE (May 08 1971)
Worldwide phase management process
Proceedings of SPIE (May 12 1992)
Virtual machining operation: a concept and an example
Proceedings of SPIE (November 11 2004)

Back to Top