Enter your keyword

2-s2.0-84922188778

[vc_empty_space][vc_empty_space]

Development of protection profile and security target for Indonesia electronic ID card’s (KTP-el) card reader based on common criteria V3.1:2012/SNI ISO/IEC 15408:2014

Aminanto M.E.a, Sutikno S.a

a Information Security Engineering and Management, Institut Teknologi Bandung, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2014 IEEE.Indonesia electronic identity card (KTP-el) system consisting wireless smartcard, smartcard reader and inhabitants database. Personal data of card holder are stored inside the card. These data can be viewed or taken by unauthorized party. Therefore, in this paper, we discuss about possible threats to the physical of KTP-el reader and the data reading process by KTP-el reader, to consolidate security of data reading process by KTP-el reader. Then, we generate Protection Profile (PP) and Security Target (ST) for KTP-el reader based on the Common Criteria (CC). We have shown how the development process of an IT product with security features that follows the international agreement, by generating the PP and ST document. This paper also conducted a gap analysis between the list of security requirements defined in PP/ST and security features of KTP-el reader prototype owned by Indonesia Agency for the Assessment and Application of Technology (BPPT). Lastly, we propose the list of recommended security requirements that shall be considered by BPPT to consolidate security of KTP-el reader.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Common criteria,Development process,Electronic ID cards,Electronic identity cards,Protection profile,Security features,Security requirements,Security target[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]common criteria,protection profile,security requirement,security target,smartcard,smartcard reader[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICAICTA.2014.7005905[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]