메뉴 건너뛰기




Volumn , Issue , 2002, Pages 1-289

Using the common criteria for IT security evaluation

Author keywords

[No Author keywords available]

Indexed keywords

CRITICAL INFRASTRUCTURES; LIFE CYCLE; MERGERS AND ACQUISITIONS; NASA; PUBLIC WORKS; SECURITY SYSTEMS;

EID: 85055232535     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9781420031423     Document Type: Book
Times cited : (68)

References (127)
  • 1
    • 85055236488 scopus 로고
    • DoD 5200.28-M, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems, U.S. Department of Defense, January
    • DoD 5200.28-M, ADP Computer Security Manual: Techniques and Procedures for Implementing, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems, U.S. Department of Defense, January 1973.
    • (1973) ADP Computer Security Manual: Techniques and Procedures for Implementing
  • 3
    • 0003969633 scopus 로고
    • CSC-STD-001-83, National Computer Security Center, U.S. Department of Defense, August 15
    • CSC-STD-001-83, Trusted Computer System Evaluation Criteria (TCSEC), National Computer Security Center, U.S. Department of Defense, August 15, 1983.
    • (1983) Trusted Computer System Evaluation Criteria (TCSEC)
  • 4
    • 0003969633 scopus 로고
    • DoD 5200.28-STD, National Computer Security Center, U.S. Department of Defense, December
    • DoD 5200.28-STD, Trusted Computer System Evaluation Criteria (TCSEC), National Computer Security Center, U.S. Department of Defense, December 1985.
    • (1985) Trusted Computer System Evaluation Criteria (TCSEC)
  • 6
    • 85055225359 scopus 로고
    • CSC-STD-004-85, National Computer Security Center, U.S. Department of Defense
    • CSC-STD-004-85, Technical Rationale Behind CSC-STD-003-83, National Computer Security Center, U.S. Department of Defense, 1985.
    • (1985) Technical Rationale behind CSC-STD-003-83
  • 8
    • 0003969639 scopus 로고
    • NCSC-TG-005, version 1, National Computer Security Center, U.S. Department of Defense, July
    • NCSC-TG-005, version 1, Trusted Network Interpretation of the TCSEC, National Computer Security Center, U.S. Department of Defense, July 1987.
    • (1987) Trusted Network Interpretation of the TCSEC
  • 9
    • 85055233068 scopus 로고
    • NCSC-TG-011, version 1, National Computer Security Center, U.S. Department of Defense, August 1
    • NCSC-TG-011, version 1, Trusted Network Interpretation of the TCSEC, National Computer Security Center, U.S. Department of Defense, August 1, 1990.
    • (1990) Trusted Network Interpretation of the TCSEC
  • 10
    • 85055235245 scopus 로고
    • NCSC-TG-021, version 1, National Computer Security Center, U.S. Department of Defense, April
    • NCSC-TG-021, version 1, Trusted DBMS Interpretation of the TCSEC, National Computer Security Center, U.S. Department of Defense, April 1991.
    • (1991) Trusted DBMS Interpretation of the TCSEC
  • 11
    • 84974740905 scopus 로고
    • DDS-2600–6243–91, version 1, Defense Intelligence Agency, U.S. Department of Defense
    • DDS-2600–6243–91, version 1, Compartmented-Mode Workstation Evaluation Criteria, Defense Intelligence Agency, U.S. Department of Defense, 1991.
    • (1991) Compartmented-Mode Workstation Evaluation Criteria
  • 12
    • 85055226710 scopus 로고
    • jointly published by the U.S. National Institute of Standards and Technology and National Security Agency, December
    • Federal Criteria for Information Technology Security, version 1.0 (Vols. I and II), jointly published by the U.S. National Institute of Standards and Technology and National Security Agency, December 1992.
    • (1992) Federal Criteria for Information Technology Security, Version 1.0 (Vols. I and II)
  • 15
    • 85055224867 scopus 로고
    • Secure Information Processing versus the Concept of Product Evaluation
    • Technical Report ECMA TR/64, December
    • Secure Information Processing versus the Concept of Product Evaluation, Technical Report ECMA TR/64, European Computer Manufacturers’ Association, December 1993.
    • (1993) European Computer Manufacturers’ Association
  • 17
    • 85055227349 scopus 로고
    • The Canadian Trusted Computer Product Evaluation Criteria (CTCPEC), Canadian System Security Centre
    • version 3.oe
    • The Canadian Trusted Computer Product Evaluation Criteria (CTCPEC), Canadian System Security Centre, Communications Security Establishment, version 3.oe, 1993.
    • (1993) Communications Security Establishment
  • 19
    • 85055226794 scopus 로고    scopus 로고
    • ISO/IEC 15408-1(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 1: Introduction and General Model
    • ISO/IEC 15408-1(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 1: Introduction and General Model.
  • 20
    • 85055233274 scopus 로고    scopus 로고
    • ISO/IEC 15408-2(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 2: Security Functional Requirements
    • ISO/IEC 15408-2(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 2: Security Functional Requirements.
  • 21
    • 85055220127 scopus 로고    scopus 로고
    • ISO/IEC 15408-3(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 3: Security assurance requirements
    • ISO/IEC 15408-3(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 3: Security assurance requirements
  • 26
    • 34247123533 scopus 로고    scopus 로고
    • CC/CEM supplements: (a) CEM-2001/0015R, Part 2: Evaluation Methodology, Supplement: ALC_FLR — Flaw Remediation, version 1.1, February, and (b) CCIMB-2002-04-011, Common Methodology for Information Technology Security Evaluation, Supplement: ASE — Security Target Evaluation, (draft) version 0.6, May 2002
    • CC/CEM supplements: (a) CEM-2001/0015R, Common Methodology for Information Technology Security Evaluation, Part 2: Evaluation Methodology, Supplement: ALC_FLR — Flaw Remediation, version 1.1, February 2002; and (b) CCIMB-2002-04-011, Common Methodology for Information Technology Security Evaluation, Supplement: ASE — Security Target Evaluation, (draft) version 0.6, May 2002.
    • (2002) Common Methodology for Information Technology Security Evaluation
  • 27
    • 85055236103 scopus 로고    scopus 로고
    • 1C Requirements Unclear, November 12
    • CCIMB Final Interpretation-004, ACM_SCP. 1C Requirements Unclear, November 12, 2001.
    • (2001) Final Interpretation-004, ACM_SCP
  • 28
    • 85055236784 scopus 로고    scopus 로고
    • Virtual Machine Description, October 15
    • CCIMB Final Interpretation-006, Virtual Machine Description, October 15, 2000.
    • (2000) Final Interpretation-006
  • 60
    • 11744346913 scopus 로고
    • General Criteria for the Operation of Testing Laboratories
    • EN 45001
    • EN 45001, General Criteria for the Operation of Testing Laboratories, CEN/CENELEC, 1989.
    • (1989) CEN/CENELEC
  • 73
    • 85055234748 scopus 로고    scopus 로고
    • National Security Telecommunications and Information System Security Committee, January
    • NSTISSP #11: National Information Assurance Acquisition Policy, National Security Telecommunications and Information System Security Committee, January 2000.
    • (2000) NSTISSP #11: National Information Assurance Acquisition Policy
  • 78
    • 1242295745 scopus 로고    scopus 로고
    • Security Requirements for Cryptographic Modules
    • FIPS PUB 140-2, U.S. Department of Commerce, May 25
    • FIPS PUB 140-2, Security Requirements for Cryptographic Modules, National Institute of Standards and Technology, U.S. Department of Commerce, May 25, 2001.
    • (2001) National Institute of Standards and Technology
  • 79
    • 84883480464 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES)
    • FIPS PUB 197, U.S. Department of Commerce, November 26
    • FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce, November 26, 2001.
    • (2001) National Institute of Standards and Technology
  • 81
    • 85055234423 scopus 로고    scopus 로고
    • Guidelines to Federal Organizations on Security Assurance and Acquisition: Use of Tested/Evaluated Products
    • NIST Special Publication 800-23, U.S. Department of Commerce, August
    • NIST Special Publication 800-23, Guidelines to Federal Organizations on Security Assurance and Acquisition: Use of Tested/Evaluated Products, National Institute of Standards and Technology, U.S. Department of Commerce, August 2000.
    • (2000) National Institute of Standards and Technology
  • 82
  • 92
    • 85008030192 scopus 로고    scopus 로고
    • Building an international security standard
    • Caplan, K. and Sanders, J., Building an international security standard, IT Professional, 1(2), 29–34, 1999.
    • (1999) IT Professional , vol.1 , Issue.2 , pp. 29-34
    • Caplan, K.1    Sanders, J.2
  • 96
    • 0035265773 scopus 로고    scopus 로고
    • Application of Common Criteria to telecomm services
    • Herrmann, D. and Keith, S., Application of Common Criteria to telecomm services, Computer Security Journal, 17(2), 21–28, 2001.
    • (2001) Computer Security Journal , vol.17 , Issue.2 , pp. 21-28
    • Herrmann, D.1    Keith, S.2
  • 101
    • 85055235630 scopus 로고    scopus 로고
    • Validation Body Standard Operating Procedures, draft 1.5, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security
    • NIAP, Validation Body Standard Operating Procedures, draft 1.5, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 2
    • Scheme Publication 2
  • 103
    • 85055225722 scopus 로고    scopus 로고
    • Guidance to Validators of IT Security Evaluations, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security
    • February
    • NIAP, Guidance to Validators of IT Security Evaluations, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 3, National Information Assurance Partnership, February 2002.
    • (2002) Scheme Publication 3, National Information Assurance Partnership
  • 104
    • 85055224178 scopus 로고    scopus 로고
    • Guidance to Common Criteria Testing Laboratories (CCTLs), version 1.0, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security
    • March 20
    • NIAP, Guidance to Common Criteria Testing Laboratories (CCTLs), version 1.0, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 4, National Information Assurance Partnership, March 20, 2001.
    • (2001) Scheme Publication 4, National Information Assurance Partnership
  • 105
    • 85055218976 scopus 로고    scopus 로고
    • Guidance to Sponsors of IT Security Evaluations, draft 1.0, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 5
    • August 31
    • NIAP, Guidance to Sponsors of IT Security Evaluations, draft 1.0, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 5, National Information Assurance Partnership, August 31, 2000.
    • (2000) National Information Assurance Partnership
  • 106
    • 85055221301 scopus 로고    scopus 로고
    • Certificate Maintenance Program, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security
    • December
    • NIAP, Certificate Maintenance Program, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 6, National Information Assurance Partnership, December 2002.
    • (2002) Scheme Publication 6, National Information Assurance Partnership
  • 112
    • 85055229000 scopus 로고    scopus 로고
    • Written Procedures for NVLAP® Handbook 150-20, October
    • Written Procedures for NVLAP® Handbook 150-20, NVLAP Lab Bulletin LB-5-2001, October 2001.
    • (2001) NVLAP Lab Bulletin LB-5-2001
  • 116
    • 85055222792 scopus 로고    scopus 로고
    • www.commoncriteria.org; centralized resource for current information about the Common Criteria standards, members, and events
    • www.commoncriteria.org; centralized resource for current information about the Common Criteria standards, members, and events.
  • 117
    • 85055225052 scopus 로고    scopus 로고
    • www.iatf.net; Information Assurance Technical Framework standard and forum
    • www.iatf.net; Information Assurance Technical Framework standard and forum.
  • 121
    • 85055216599 scopus 로고    scopus 로고
    • information about NIST cryptographic validation program
    • http://csrc.nist.gov/crptval; information about NIST cryptographic validation program.
  • 123
    • 85055223149 scopus 로고    scopus 로고
    • Computer and information security policy
    • http://secinf.net/info/policy/hk_polic.html; Computer and information security policy.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.