-
1
-
-
85055236488
-
-
DoD 5200.28-M, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems, U.S. Department of Defense, January
-
DoD 5200.28-M, ADP Computer Security Manual: Techniques and Procedures for Implementing, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems, U.S. Department of Defense, January 1973.
-
(1973)
ADP Computer Security Manual: Techniques and Procedures for Implementing
-
-
-
2
-
-
85051995631
-
-
DoD 5200.28-M, with 1st Amendment, U.S. Department of Defense, June 25
-
DoD 5200.28-M, ADP Computer Security Manual: Techniques and Procedures for Implementing, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems, with 1st Amendment, U.S. Department of Defense, June 25, 1979.
-
(1979)
ADP Computer Security Manual: Techniques and Procedures for Implementing, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems
-
-
-
3
-
-
0003969633
-
-
CSC-STD-001-83, National Computer Security Center, U.S. Department of Defense, August 15
-
CSC-STD-001-83, Trusted Computer System Evaluation Criteria (TCSEC), National Computer Security Center, U.S. Department of Defense, August 15, 1983.
-
(1983)
Trusted Computer System Evaluation Criteria (TCSEC)
-
-
-
4
-
-
0003969633
-
-
DoD 5200.28-STD, National Computer Security Center, U.S. Department of Defense, December
-
DoD 5200.28-STD, Trusted Computer System Evaluation Criteria (TCSEC), National Computer Security Center, U.S. Department of Defense, December 1985.
-
(1985)
Trusted Computer System Evaluation Criteria (TCSEC)
-
-
-
6
-
-
85055225359
-
-
CSC-STD-004-85, National Computer Security Center, U.S. Department of Defense
-
CSC-STD-004-85, Technical Rationale Behind CSC-STD-003-83, National Computer Security Center, U.S. Department of Defense, 1985.
-
(1985)
Technical Rationale behind CSC-STD-003-83
-
-
-
8
-
-
0003969639
-
-
NCSC-TG-005, version 1, National Computer Security Center, U.S. Department of Defense, July
-
NCSC-TG-005, version 1, Trusted Network Interpretation of the TCSEC, National Computer Security Center, U.S. Department of Defense, July 1987.
-
(1987)
Trusted Network Interpretation of the TCSEC
-
-
-
9
-
-
85055233068
-
-
NCSC-TG-011, version 1, National Computer Security Center, U.S. Department of Defense, August 1
-
NCSC-TG-011, version 1, Trusted Network Interpretation of the TCSEC, National Computer Security Center, U.S. Department of Defense, August 1, 1990.
-
(1990)
Trusted Network Interpretation of the TCSEC
-
-
-
10
-
-
85055235245
-
-
NCSC-TG-021, version 1, National Computer Security Center, U.S. Department of Defense, April
-
NCSC-TG-021, version 1, Trusted DBMS Interpretation of the TCSEC, National Computer Security Center, U.S. Department of Defense, April 1991.
-
(1991)
Trusted DBMS Interpretation of the TCSEC
-
-
-
11
-
-
84974740905
-
-
DDS-2600–6243–91, version 1, Defense Intelligence Agency, U.S. Department of Defense
-
DDS-2600–6243–91, version 1, Compartmented-Mode Workstation Evaluation Criteria, Defense Intelligence Agency, U.S. Department of Defense, 1991.
-
(1991)
Compartmented-Mode Workstation Evaluation Criteria
-
-
-
12
-
-
85055226710
-
-
jointly published by the U.S. National Institute of Standards and Technology and National Security Agency, December
-
Federal Criteria for Information Technology Security, version 1.0 (Vols. I and II), jointly published by the U.S. National Institute of Standards and Technology and National Security Agency, December 1992.
-
(1992)
Federal Criteria for Information Technology Security, Version 1.0 (Vols. I and II)
-
-
-
15
-
-
85055224867
-
Secure Information Processing versus the Concept of Product Evaluation
-
Technical Report ECMA TR/64, December
-
Secure Information Processing versus the Concept of Product Evaluation, Technical Report ECMA TR/64, European Computer Manufacturers’ Association, December 1993.
-
(1993)
European Computer Manufacturers’ Association
-
-
-
17
-
-
85055227349
-
The Canadian Trusted Computer Product Evaluation Criteria (CTCPEC), Canadian System Security Centre
-
version 3.oe
-
The Canadian Trusted Computer Product Evaluation Criteria (CTCPEC), Canadian System Security Centre, Communications Security Establishment, version 3.oe, 1993.
-
(1993)
Communications Security Establishment
-
-
-
19
-
-
85055226794
-
-
ISO/IEC 15408-1(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 1: Introduction and General Model
-
ISO/IEC 15408-1(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 1: Introduction and General Model.
-
-
-
-
20
-
-
85055233274
-
-
ISO/IEC 15408-2(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 2: Security Functional Requirements
-
ISO/IEC 15408-2(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 2: Security Functional Requirements.
-
-
-
-
21
-
-
85055220127
-
-
ISO/IEC 15408-3(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 3: Security assurance requirements
-
ISO/IEC 15408-3(1999-12-01), Information Technology — Security Techniques — Evaluation Criteria for IT Security — Part 3: Security assurance requirements
-
-
-
-
26
-
-
34247123533
-
-
CC/CEM supplements: (a) CEM-2001/0015R, Part 2: Evaluation Methodology, Supplement: ALC_FLR — Flaw Remediation, version 1.1, February, and (b) CCIMB-2002-04-011, Common Methodology for Information Technology Security Evaluation, Supplement: ASE — Security Target Evaluation, (draft) version 0.6, May 2002
-
CC/CEM supplements: (a) CEM-2001/0015R, Common Methodology for Information Technology Security Evaluation, Part 2: Evaluation Methodology, Supplement: ALC_FLR — Flaw Remediation, version 1.1, February 2002; and (b) CCIMB-2002-04-011, Common Methodology for Information Technology Security Evaluation, Supplement: ASE — Security Target Evaluation, (draft) version 0.6, May 2002.
-
(2002)
Common Methodology for Information Technology Security Evaluation
-
-
-
27
-
-
85055236103
-
-
1C Requirements Unclear, November 12
-
CCIMB Final Interpretation-004, ACM_SCP. 1C Requirements Unclear, November 12, 2001.
-
(2001)
Final Interpretation-004, ACM_SCP
-
-
-
28
-
-
85055236784
-
-
Virtual Machine Description, October 15
-
CCIMB Final Interpretation-006, Virtual Machine Description, October 15, 2000.
-
(2000)
Final Interpretation-006
-
-
-
60
-
-
11744346913
-
General Criteria for the Operation of Testing Laboratories
-
EN 45001
-
EN 45001, General Criteria for the Operation of Testing Laboratories, CEN/CENELEC, 1989.
-
(1989)
CEN/CENELEC
-
-
-
73
-
-
85055234748
-
-
National Security Telecommunications and Information System Security Committee, January
-
NSTISSP #11: National Information Assurance Acquisition Policy, National Security Telecommunications and Information System Security Committee, January 2000.
-
(2000)
NSTISSP #11: National Information Assurance Acquisition Policy
-
-
-
78
-
-
1242295745
-
Security Requirements for Cryptographic Modules
-
FIPS PUB 140-2, U.S. Department of Commerce, May 25
-
FIPS PUB 140-2, Security Requirements for Cryptographic Modules, National Institute of Standards and Technology, U.S. Department of Commerce, May 25, 2001.
-
(2001)
National Institute of Standards and Technology
-
-
-
79
-
-
84883480464
-
Advanced Encryption Standard (AES)
-
FIPS PUB 197, U.S. Department of Commerce, November 26
-
FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce, November 26, 2001.
-
(2001)
National Institute of Standards and Technology
-
-
-
81
-
-
85055234423
-
Guidelines to Federal Organizations on Security Assurance and Acquisition: Use of Tested/Evaluated Products
-
NIST Special Publication 800-23, U.S. Department of Commerce, August
-
NIST Special Publication 800-23, Guidelines to Federal Organizations on Security Assurance and Acquisition: Use of Tested/Evaluated Products, National Institute of Standards and Technology, U.S. Department of Commerce, August 2000.
-
(2000)
National Institute of Standards and Technology
-
-
-
82
-
-
33847535385
-
-
Public Law 100-235, January 8
-
Public Law 100-235, Computer Security Act of 1987, January 8, 1988.
-
(1988)
Computer Security Act of 1987
-
-
-
90
-
-
85055227655
-
Application of the Protection Profile to Define Requirements for a Telecommunications Services Contract
-
CERIAS, Purdue University, West Lafayette, IN, March
-
Abrams, M., Parraga, F., and Veoni, J., Application of the Protection Profile to Define Requirements for a Telecommunications Services Contract, Paper presented at the 1st Symposium on Requirements Engineering for Information Security, CERIAS, Purdue University, West Lafayette, IN, March 2001.
-
(2001)
Paper Presented at the 1St Symposium on Requirements Engineering for Information Security
-
-
Abrams, M.1
Parraga, F.2
Veoni, J.3
-
92
-
-
85008030192
-
Building an international security standard
-
Caplan, K. and Sanders, J., Building an international security standard, IT Professional, 1(2), 29–34, 1999.
-
(1999)
IT Professional
, vol.1
, Issue.2
, pp. 29-34
-
-
Caplan, K.1
Sanders, J.2
-
95
-
-
85060409988
-
-
June 22, p
-
Gertz, B., CIA: Russia, China working on infor mation warfare, The Washington Times, June 22, 2001, p. A3.
-
(2001)
CIA: Russia, China Working on Infor Mation Warfare, the Washington Times
, pp. A3
-
-
Gertz, B.1
-
96
-
-
0035265773
-
Application of Common Criteria to telecomm services
-
Herrmann, D. and Keith, S., Application of Common Criteria to telecomm services, Computer Security Journal, 17(2), 21–28, 2001.
-
(2001)
Computer Security Journal
, vol.17
, Issue.2
, pp. 21-28
-
-
Herrmann, D.1
Keith, S.2
-
98
-
-
85055216596
-
-
October
-
Kekicheff, M., Kashef, F., and Brewer, D., The Open Platform Protection Profile (OP3): Taking the Common Criteria to the Outer Limits, paper pr esented at the 23rd National Information Systems Security Conference, October 2000.
-
(2000)
The Open Platform Protection Profile (OP3): Taking the Common Criteria to the Outer Limits, Paper Pr Esented at the 23Rd National Information Systems Security Conference
-
-
Kekicheff, M.1
Kashef, F.2
Brewer, D.3
-
100
-
-
85055226364
-
-
Scheme Publication 1, National Information Assurance Partnership, May
-
NIAP, Organization, Management, and Concept of Operations, version 2.0, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 1, National Information Assurance Partnership, May 1999.
-
(1999)
Organization, Management, and Concept of Operations, Version 2.0, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security
-
-
-
101
-
-
85055235630
-
Validation Body Standard Operating Procedures, draft 1.5, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security
-
NIAP, Validation Body Standard Operating Procedures, draft 1.5, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 2
-
Scheme Publication 2
-
-
-
103
-
-
85055225722
-
Guidance to Validators of IT Security Evaluations, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security
-
February
-
NIAP, Guidance to Validators of IT Security Evaluations, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 3, National Information Assurance Partnership, February 2002.
-
(2002)
Scheme Publication 3, National Information Assurance Partnership
-
-
-
104
-
-
85055224178
-
Guidance to Common Criteria Testing Laboratories (CCTLs), version 1.0, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security
-
March 20
-
NIAP, Guidance to Common Criteria Testing Laboratories (CCTLs), version 1.0, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 4, National Information Assurance Partnership, March 20, 2001.
-
(2001)
Scheme Publication 4, National Information Assurance Partnership
-
-
-
105
-
-
85055218976
-
Guidance to Sponsors of IT Security Evaluations, draft 1.0, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 5
-
August 31
-
NIAP, Guidance to Sponsors of IT Security Evaluations, draft 1.0, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 5, National Information Assurance Partnership, August 31, 2000.
-
(2000)
National Information Assurance Partnership
-
-
-
106
-
-
85055221301
-
Certificate Maintenance Program, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security
-
December
-
NIAP, Certificate Maintenance Program, Common Criteria Evaluation and Validation Scheme (CCEVS) for IT Security, Scheme Publication 6, National Information Assurance Partnership, December 2002.
-
(2002)
Scheme Publication 6, National Information Assurance Partnership
-
-
-
112
-
-
85055229000
-
-
Written Procedures for NVLAP® Handbook 150-20, October
-
Written Procedures for NVLAP® Handbook 150-20, NVLAP Lab Bulletin LB-5-2001, October 2001.
-
(2001)
NVLAP Lab Bulletin LB-5-2001
-
-
-
116
-
-
85055222792
-
-
www.commoncriteria.org; centralized resource for current information about the Common Criteria standards, members, and events
-
www.commoncriteria.org; centralized resource for current information about the Common Criteria standards, members, and events.
-
-
-
-
117
-
-
85055225052
-
-
www.iatf.net; Information Assurance Technical Framework standard and forum
-
www.iatf.net; Information Assurance Technical Framework standard and forum.
-
-
-
-
121
-
-
85055216599
-
-
information about NIST cryptographic validation program
-
http://csrc.nist.gov/crptval; information about NIST cryptographic validation program.
-
-
-
-
123
-
-
85055223149
-
-
Computer and information security policy
-
http://secinf.net/info/policy/hk_polic.html; Computer and information security policy.
-
-
-
|