Proceedings of the 2007 ACM Symposium on Applied Computing 2007
DOI: 10.1145/1244002.1244325
|View full text |Cite
|
Sign up to set email alerts
|

Formal verification of security specifications with common criteria

Abstract: This paper proposes a formalization and verification technique for security specifications, based on common criteria. Generally, it is difficult to define reliable security properties that should be applied to validate an information system. Therefore, we have applied security functional requirements that are defined in the ISO/IEC 15408 common criteria to the formal verification of security specifications. We formalized the security criteria of ISO/IEC 15408 and developed a process, using Z notation, for veri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…The specifications which are described with the database can be considered to be the security specification certified by ISO/IEC 15408. This fact is verifiable by our formal verification technique [3,5].…”
Section: Discussionmentioning
confidence: 63%
“…The specifications which are described with the database can be considered to be the security specification certified by ISO/IEC 15408. This fact is verifiable by our formal verification technique [3,5].…”
Section: Discussionmentioning
confidence: 63%
“…Furthermore, some tools have been developed to fulfill security requirements. For example, Morimoto et al [149] proposed a process that makes the security specifications with the CC formalized in a mathematics manner. In addition, Teri et al [150] introduced a model called B method that can formally model security specifications of the Java Card.…”
Section: Future Directionsmentioning
confidence: 99%
“…In [23,13] concepts for the application of formal methods to a secure software implementation flow are presented. Some of the presented techniques can also be applied to hardware certification, but abstraction is a challenge concerning RTL descriptions.…”
Section: High-level Verification For the Security Domainmentioning
confidence: 99%