{"title":"Mobile communication security controllers an evaluation paper","authors":"Keith E. Mayes, Konstantinos Markantonakis","doi":"10.1016/j.istr.2008.09.004","DOIUrl":"10.1016/j.istr.2008.09.004","url":null,"abstract":"<div><p>Cellular communication via a traditional mobile handset is a ubiquitous part of modern life and as device technology and network performance continues to advance, it becomes possible for laptop computers, Personal Digital Assistants [PDAs; Note abbreviations will be shown in square brackets to avoid confusion with references.] and even electrical meters to better exploit mobile networks for wireless communication. As the diverse demands for network access and value added services increase, so does the importance of maintaining secure and consistent access controls. A critical and well-proven component of the GSM and UMTS security solution is the smart card in the form of the SIM or USIM respectively. This has also extended into some regions using variants of CDMA standards where the RUIM is specified. However with the enlarged range of communications devices, some manufacturers claim that the hardware selection, chip design, operating system implementation and security concept are different from traditional mobile phones. This has led to a suggestion that types of “Software SIM” should be used as an alternative to the smart card based solution. This paper investigates the suggestion.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"13 3","pages":"Pages 173-192"},"PeriodicalIF":0.0,"publicationDate":"2008-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2008.09.004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122297189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity management of e-ID, privacy and security in Europe. A human rights view","authors":"Paul De Hert","doi":"10.1016/j.istr.2008.07.001","DOIUrl":"10.1016/j.istr.2008.07.001","url":null,"abstract":"<div><p>With privacy enhancing identity management, end users are given better ways for managing their identities for specific contexts. One could easily argue that the need to implement identity management systems that are privacy enhancing follows from the EU data protection regulation. One of the challenges while developing privacy enhancing identity management is getting governments to become genuinely interested, both in their capacity of data processing organisation and legislator or policy maker. Another challenge, this time for the private sector, is to find the right balance between data protection perfection and simplicity or users' convenience, while developing privacy enhancing identity management systems. After a brief discussion of these challenges we discuss the growing human rights recognition of the value of digital identity and its management. In particular, the German constitutional court seems to pave the way for a basic right to have digital identity protected and secured.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"13 2","pages":"Pages 71-75"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2008.07.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129658462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution","authors":"Thomas Myhr","doi":"10.1016/j.istr.2008.06.001","DOIUrl":"10.1016/j.istr.2008.06.001","url":null,"abstract":"<div><p>In this article I discuss the creation of a pan-European eID and the legal and organizational challenges connected to that in cross-border transactions within the EU/EEA. I mainly focus on issuance procedures and (the lack of) a European “standard” on a unique identifier of physical persons that can be used in the eID. My main solution here is to use, as far as possible, existing national and international requirements on the content of passport and how they are issued. In addition I present two issues that I think the European Commission should focus on that would have a significant positive effect on the work on achieving cross-border interoperability. These issues are (i) setting up requirements for Validation Authorities and self-declaratory schemes and (ii) setting up a quality classification system, where different national security levels can be mapped up against neutral requirements adopted by the European Commission.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"13 2","pages":"Pages 76-82"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2008.06.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116091238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The benefits and drawbacks of using electronic identities","authors":"Geraint Price","doi":"10.1016/j.istr.2008.07.002","DOIUrl":"10.1016/j.istr.2008.07.002","url":null,"abstract":"<div><p>In this article we carry out a critical analysis of the benefits and drawbacks which are likely when we include electronic data to hold, validate and process the information used to generate and manage an identity. In addition, we consider the potential knock-on impact of this for the transactions which rely on this electronic identity information.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"13 2","pages":"Pages 95-103"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2008.07.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Insights on identity documents based on the Belgian case study","authors":"Danny De Cock, Koen Simoens, Bart Preneel","doi":"10.1016/j.istr.2008.06.004","DOIUrl":"10.1016/j.istr.2008.06.004","url":null,"abstract":"<div><p>Efficient eGovernment and eCommerce require the ability to authenticate citizens and transactions online, whereas the increasing mobility of citizens demands reliable identification. Identity documents tend to become the most popular form of identity tokens used for these purposes. An important problem, however, is that they can easily be passed on or used by a fraudster. We discuss the use of identity documents and the problem of linking these documents with their genuine holder. We discuss ePassports and eID cards in general using the Belgian identity documents as a reference.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"13 2","pages":"Pages 54-60"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2008.06.004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131719043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“Building secure business applications at Microsoft” by J. Steer and A. Popli","authors":"","doi":"10.1016/j.istr.2008.09.001","DOIUrl":"https://doi.org/10.1016/j.istr.2008.09.001","url":null,"abstract":"","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"13 2","pages":"Page 104"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2008.09.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137420515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building secure business applications at Microsoft","authors":"John Steer , Ashish Popli","doi":"10.1016/j.istr.2008.04.001","DOIUrl":"10.1016/j.istr.2008.04.001","url":null,"abstract":"<div><p>Like many global enterprises, Microsoft depends on internally developed and third-party line-of-business (LOB) applications to run its daily business activities. Nearly 4000 LOB applications are in service at Microsoft including a significant number of applications that contain business-sensitive data, customer data, or confidential employee data.</p><p>In 2001 the Microsoft IT organization wanted to make sure that the company's security risk was appropriately managed. The Security Development Life cycle for IT (SDL-IT) was created within Microsoft IT to keep track of, assess, and address potential security and privacy vulnerabilities found in LOB applications. A specialist team called the Application Consulting and Engineering (ACE) Team was formed to manage the program, providing support and oversight ensuring that application development teams adhere to the SDL-IT process.</p><p>This paper contains descriptions of the processes and standards that make up the SDL-IT process and discusses best practices that might be useful to other organizations wishing to create and enforce a security and privacy processes for LOB applications. While this paper describes Microsoft ITs own security and privacy process the authors recognize that every organization is unique and believe that the technology agnostic SDL-IT process and methodologies described can be implemented in other enterprises.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"13 2","pages":"Pages 105-110"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2008.04.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122875986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID)","authors":"Tony Collings","doi":"10.1016/j.istr.2008.06.002","DOIUrl":"10.1016/j.istr.2008.06.002","url":null,"abstract":"<div><p>This article I have outlined the fundamental issues that underpin any Identity or e-ID Scheme and any attempt to turn them into an automated e-ID delivery. The significance of Identity has almost gone un-noticed as our highly complex and interdependent technological society has evolved. It is only with the debate surrounding ID card systems and the rise of internet and electronic fraud that there is any awakening and understanding of the real issues that underpin identity and its impact upon society. The article examines why Identity matters by comparing what goes into the underlying logic and process underpinning electronic identity. The European Commission national ID Card scheme and other international perspectives are compared with what the USA is doing in this area and with what the UK is proposing with its national ID Card scheme. A discusses the basics components of identity, identity crime and some unintended consequences of electronic identity schemes.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"13 2","pages":"Pages 61-70"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2008.06.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131146138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marit Hansen , Andreas Pfitzmann , Sandra Steinbrecher
{"title":"Identity management throughout one's whole life","authors":"Marit Hansen , Andreas Pfitzmann , Sandra Steinbrecher","doi":"10.1016/j.istr.2008.06.003","DOIUrl":"10.1016/j.istr.2008.06.003","url":null,"abstract":"<div><p>Identity management has to comprise all areas of life throughout one's whole lifetime to gain full advantages, e.g., ease-of-use for all kinds of digital services, authenticity and authorisation, reputation and user-controlled privacy.</p><p>To help laying the foundations for identity management applicable to people's whole life, we describe the formation of digital identities happening numerous times within one's physical life, i.e., their establishment, evolvement and termination, and derive building blocks for managing these digital identities from the needs of individuals and of society.</p><p>The identity attributes occurring and developing can be categorised according to their sensitiveness and the security requirements individuals have regarding them. We give an analysis of the sensitivity of identities and their attributes w.r.t. privacy and security both from a legal and individual's perspective. This leads to how systems for identity management throughout one's whole life should be designed using the building blocks derived.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"13 2","pages":"Pages 83-94"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2008.06.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124009513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure software development: Why the development world awoke to the challenge","authors":"Mason Brown, Alan Paller","doi":"10.1016/j.istr.2008.03.001","DOIUrl":"10.1016/j.istr.2008.03.001","url":null,"abstract":"<div><p>From the beginning of the information security age 20 years ago, CIOs have asked over and over, “when will programmers stop making security mistakes?” But other than highly visible efforts by a few large software vendors, the software development community has not heard the question. At least they have not responded until now.</p><p>More than 40 large organizations, from Tata Consulting Services (the largest outsourcer in India) to Intel, from Boeing to Siemens, have joined together to raise the visibility of secure software development – and they are having an impact.</p><p>This article chronicles the forces that brought the consortium together and the steps that they have taken to improve the practice of secure coding throughout the development lifecycle.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"13 1","pages":"Pages 40-43"},"PeriodicalIF":0.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2008.03.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124889280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}