Published: April 19, 2008
Author(s)
Ramaswamy Chandramouli
Conference
Name: IADIS International Conference Information Systems
Dates: April 9-11, 2008
Location: Algarve, Portugal
Citation: Proceedings of the IADIS International Conference on Information Systems 2008, pp. 115-122
Announcement
With the increasing use of smart cards for identity verification of individuals, it has become imperative for organizations to properly design and engineer the expensive infrastructure system that supports smart card deployment. Apart from sound system design principles, this class of system (which we denote by the abbreviation IS-SCD standing for Infrastructure System for Smart Card Deployment) requires rich body of domain knowledge in the areas of identity information, generation, storage , distribution and usage of different sets of credentials, the methods of capturing of credentials etc. The design methodology we describe for IS-SCD in this paper has as its basis a business process definition framework built using two credentialing specifications used for large scale smart card deployments. In addition, the methodology uses both top-down and bottom-up strategies for gathering all data requirements and employs a good blend of process and data analysis towards the goal of defining a final system architecture for IS-SCD.
With the increasing use of smart cards for identity verification of individuals, it has become imperative for organizations to properly design and engineer the expensive infrastructure system that supports smart card deployment. Apart from sound system design principles, this class of system (which...
See full abstract
With the increasing use of smart cards for identity verification of individuals, it has become imperative for organizations to properly design and engineer the expensive infrastructure system that supports smart card deployment. Apart from sound system design principles, this class of system (which we denote by the abbreviation IS-SCD standing for Infrastructure System for Smart Card Deployment) requires rich body of domain knowledge in the areas of identity information, generation, storage , distribution and usage of different sets of credentials, the methods of capturing of credentials etc. The design methodology we describe for IS-SCD in this paper has as its basis a business process definition framework built using two credentialing specifications used for large scale smart card deployments. In addition, the methodology uses both top-down and bottom-up strategies for gathering all data requirements and employs a good blend of process and data analysis towards the goal of defining a final system architecture for IS-SCD.
Hide full abstract
Keywords
credentials; identity management; smart card
Control Families
None selected