Abstract
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the impact of the security break on the smart card based electronic cash economy. This paper discusses the assessment of threats in two phases using two different methodologies. The first is the assessment of overall threat using the business system analysis model called “value chain” — the methodology to evaluate the activities necessary to achieve the final objectives of the counterfeiting organization. It is a qualitative method. The second is the quantification of such a threat using micro dynamic simulation.
Preview
Unable to display preview. Download preview PDF.
References
Ezawa, K.J. and Schuermann, T., “Fraud/Uncollectible Debt Detection Using a Bayesian Network Based Learning System: A Rare Binary Outcome with Mixed Data Structures,” Proeedings of the 11th Conference Uncertainty in Artificial Intelligence, Morgan Kaufmann, pp. 157–166 (1995).
Ezawa, K.J., Singh, M., and Norton, S.W., “Learning Goal Oriented Bayesian Networks for Telecommunications Risk Management”, Proceedings of the 13th International Conference on Machine Learning, Morgan Kaufmann (1996).
Ezawa, K.J., and Norton, S., “Constructing Bayesian Networks to Predict Uncollectible Telecommunications Accounts,” IEEE EXPERT, Vol. 11, No. 5, pp. 45–51 (1996).
Maher, D.P., “Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective,” Financial Cryptography '97 — First International Conference, Springer Verlag (1997).
Porter, M.E., “Competitive Advantage,” Free Press (1985).
Harding, A.(editor), “Microsimulation and Public Policy”, North-Holland (1996).
Napiorkowski, G. and Borghard, W., “Modeling of Customer Response to Marketing of Local Telephone Services” in Dynamic Competitive Analysis in Marketing, Springer Verlag (1996).
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ezawa, K.J., Napiorkowski, G. (1998). Assessment of threats for smart card based electronic cash. In: Hirchfeld, R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055473
Download citation
DOI: https://doi.org/10.1007/BFb0055473
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64951-9
Online ISBN: 978-3-540-53918-6
eBook Packages: Springer Book Archive