Designing a Secure Point-of-Sale System

Robin Sharp, Allan Pedersen, Anders Hedegaard

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    This paper describes some experiences with using the ''Common Criteria for Information Security Evaluation'' as the basis for a design methodology when designing secure systems. As an example, the design process for a Point-of-Sale (POS) system is described.
    Original languageEnglish
    Title of host publicationFourth IEEE International Workshop on Information Assurance (IWIA'06)
    PublisherIEEE Computer Society Press
    Publication date2006
    Pages51-65
    ISBN (Print)0-7695-2564-4
    DOIs
    Publication statusPublished - 2006
    EventFourth IEEE International Workshop on Information Assurance - London, United Kingdom
    Duration: 13 Apr 200614 Apr 2006
    Conference number: 4
    https://ieeexplore.ieee.org/xpl/conhome/10708/proceeding

    Conference

    ConferenceFourth IEEE International Workshop on Information Assurance
    Number4
    Country/TerritoryUnited Kingdom
    CityLondon
    Period13/04/200614/04/2006
    Internet address

    Keywords

    • Security
    • Common Criteria
    • Security Engineering

    Fingerprint

    Dive into the research topics of 'Designing a Secure Point-of-Sale System'. Together they form a unique fingerprint.

    Cite this