Proceedings of the 2006 ACM Symposium on Applied Computing 2006
DOI: 10.1145/1141277.1141701
|View full text |Cite
|
Sign up to set email alerts
|

A security specification verification technique based on the international standard ISO/IEC 15408

Abstract: This paper proposes a security specification verification technique based on the international standard ISO/IEC 15408. We formalized the security criteria of ISO/IEC 15408 and developed the verification technique of security specifications based on the formalized criteria with formal methods. With the technique, one can formally verify whether or not specifications satisfy the security criteria of ISO/IEC 15408. Ambiguity and/or oversight about security in specifications written in natural language can also be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2006
2006
2010
2010

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…For using these approaches, we formalized all 251 security functional requirements as formal criteria. We have already proposed a security specification verification technique using them [18,19]. Since the formal criteria have been defined as templates for flexibility, they must be instantiated in order to fit into a target specification.…”
Section: The Formal Verification Of the Examplementioning
confidence: 99%
“…For using these approaches, we formalized all 251 security functional requirements as formal criteria. We have already proposed a security specification verification technique using them [18,19]. Since the formal criteria have been defined as templates for flexibility, they must be instantiated in order to fit into a target specification.…”
Section: The Formal Verification Of the Examplementioning
confidence: 99%