메뉴 건너뛰기




Volumn , Issue , 2002, Pages 129-138

Secure systems development based on the common criteria: The PaIME project

Author keywords

AutoFocus; CASE; Case study; Common criteria; Development process; Formal methods; Graphical description techniques; Requirements engineering; Security engineering; Software design; Software engineering

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER HARDWARE DESCRIPTION LANGUAGES; HAND HELD COMPUTERS; INTERNET; REQUIREMENTS ENGINEERING; SYSTEMS ANALYSIS;

EID: 0038348212     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (39)

References (23)
  • 3
    • 20444495150 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation version 2.1
    • Technical report
    • Common criteria for information technology security evaluation version 2.1. Technical report, 1999. URL: http://www.commoncriteria.org/docs/index.html.
    • (1999)
  • 4
    • 0037917942 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation supplement: Vulnerability analysis and penetration testing
    • Technical report
    • Common criteria for information technology security evaluation supplement: Vulnerability analysis and penetration testing. Technical report, 2002. URL: http://www.commoncriteria.org/review_docs/index.html.
    • (2002)
  • 9
    • 0037579920 scopus 로고    scopus 로고
    • (in German)
    • IABG. V-Modell 97, 1999. URL:http://www.-modell.iabg.de/ (in German).
    • (1999) IABG. V-Modell 97
  • 10
    • 0038594099 scopus 로고    scopus 로고
    • ITSEC. Information Technology Security Evaluation Criteria-Harmonised Criteria of France, Germany, the Netherlands, the United Kingdom, May 1990. Version 1
    • ITSEC. Information Technology Security Evaluation Criteria-Harmonised Criteria of France, Germany, the Netherlands, the United Kingdom, May 1990. Version 1.
  • 12
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the needham-schroeder public-key protocol using FDR
    • In Margaria and Steffen, editors; Springer
    • G. Lowe. Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR. In Margaria and Steffen, editors, TACAS, volume 1055 of Lecture Notes on Computer Science, pages 147-166, Springer, 1996.
    • (1996) TACAS, Volume 1055 of Lecture Notes on Computer Science , pp. 147-166
    • Lowe, G.1
  • 15
    • 0037917941 scopus 로고    scopus 로고
    • PalME-Team. PalME secure Palm-based Money Exchange - Project Homepage; (in German)
    • PalME-Team. PalME secure Palm-based Money Exchange - Project Homepage, 2001, URL:http://www4.in.tum.de/~palme/ (in German).
    • (2001)
  • 16
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2): 85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 18
    • 0038594096 scopus 로고    scopus 로고
    • Quest: Overview over the project
    • In D. Hutter. W. Stephan, P. Traverso, and M. Ullmann, editors; Springer LNCS 1641
    • O. Slotosch. Quest: Overview over the Project. In D. Hutter. W. Stephan, P. Traverso, and M. Ullmann, editors, Applied Formal Methods - FM-Trends 98, pages 346-350. Springer LNCS 1641, 1998
    • (1998) Applied Formal Methods - FM-Trends 98 , pp. 346-350
    • Slotosch, O.1
  • 20
    • 0020160380 scopus 로고
    • On the inevitable interleaving of specification and implementation
    • W. Swartout and R. Balzer. On the Inevitable Interleaving of Specification and Implementation. Communications of the ACM, 25(7), 1982.
    • (1982) Communications of the ACM , vol.25 , Issue.7
    • Swartout, W.1    Balzer, R.2
  • 21
    • 0038255533 scopus 로고    scopus 로고
    • Security engineering nach den common criteria - Eine fallstudie
    • Master's thesis, Technische Universität Müchen, Aug.
    • M. Vetterling. Security Engineering nach den Common Criteria - eine Fallstudie. Master's thesis, Technische Universität Müchen, Aug. 2001
    • (2001)
    • Vetterling, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.