A conditional access system (CAS) only allows appropriate users to get access to contents. The advent of exchangeable CAS (XCAS) that updated version of CAS is developed. But the standards or evaluation schemes for XCAS are absent, so many interoperability problems among XCAS of each company may have to be occurred. Therefore, a specific scheme that can evaluate the security and suitability of exchangeable conditional access systems has been requested. In this paper, we propose an appropriate evaluation scheme for XCAS. The evaluation scheme includes an evaluation purpose and four components to evaluate the evaluation target, the evaluation process, the evaluation subject, and the evaluation cost involved.
|Title of host publication||Information Security Practice and Experience - 6th International Conference, ISPEC 2010, Proceedings|
|Number of pages||12|
|Publication status||Published - 2010|
|Event||6th International Conference on Information Security Practice and Experience, ISPEC 2010 - Seoul, Korea, Republic of|
Duration: 2010 May 12 → 2010 May 13
|Name||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)|
|Other||6th International Conference on Information Security Practice and Experience, ISPEC 2010|
|Country/Territory||Korea, Republic of|
|Period||10/5/12 → 10/5/13|
Bibliographical noteFunding Information:
“This research was supported by the MKE(Ministry of Knowledge Economy), Korea, under the ITRC(Information Technology Research Center) support program supervised by the NIPA(National IT Industry Promotion Agency)” (NIPA-2009-(C1090-0902-0016)).
This work was supported by Defense Acquisition Program Administration and Agency for Defense Development under the contract UD070054AD.
- Common criteria
- Conditional access system
- Downloadable CAS
- Exchangeable CAS
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science(all)