Günümüzde akıllı kartlar sıklıkla bilgi teknolojileri alanında kullanılmaya başladığından güvenlik önemli bir konu haline gelmiştir. Bu yazıda özellikle akıllı kartların güvenliğine yönelik saldırılar anlatılmıştır. Akıllı kart geliştirilmesi ile ilgili çalışmalar sırasında dikkat edilmesi gereken güvenlik konuları üzerinde durulmuştur. Bu makale güvenli akıllı kart işletim sistemi gereklerini ve akıllı kart donanım ve işletim sisteminin sağlaması gereken ortak ölçüt güvence seviyesini belirtir. Ayrıca bu makalede “dinamik güvenlik işlevi” olarak adlandırılan yeni güvenlik yaklaşımı ve kullanımı da anlatılmıştır.
Today, as the smart cards are frequently used in Information Technologies, smart card security has become an important issue. In this paper, security attacks that are specific to smart cards are described. Security considerations that need to be taken into account when developing a secure smart card are studied. The paper indicates that the requirements of the secure, robust smart card operating system and common criteria assurance level of the smart card hardware and operating system. Also, new security approach which is called “dynamic security function” is published. The usage of the dynamic security functions is described in this paper.
Other ID | JA37JF23ZN |
---|---|
Journal Section | Makaleler(Araştırma) |
Authors | |
Publication Date | June 24, 2016 |
Published in Issue | Year 2012 Volume: 5 Issue: 1 |
Article Acceptance
Use user registration/login to upload articles online.
The acceptance process of the articles sent to the journal consists of the following stages:
1. Each submitted article is sent to at least two referees at the first stage.
2. Referee appointments are made by the journal editors. There are approximately 200 referees in the referee pool of the journal and these referees are classified according to their areas of interest. Each referee is sent an article on the subject he is interested in. The selection of the arbitrator is done in a way that does not cause any conflict of interest.
3. In the articles sent to the referees, the names of the authors are closed.
4. Referees are explained how to evaluate an article and are asked to fill in the evaluation form shown below.
5. The articles in which two referees give positive opinion are subjected to similarity review by the editors. The similarity in the articles is expected to be less than 25%.
6. A paper that has passed all stages is reviewed by the editor in terms of language and presentation, and necessary corrections and improvements are made. If necessary, the authors are notified of the situation.
. This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.