2002
DOI: 10.1145/605466.605486
|View full text |Cite
|
Sign up to set email alerts
|

Secure systems development based on the common criteria

Abstract: Security is a very important issue in information processing, especially in open network environments like the Internet.The Common Criteria (CC) is the standard requirements catalogue for the evaluation of security critical systems. Using the CC, a large number of security requirements on the system itself and on the system development can be defined. However, the CC does not give methodological support.In this paper, we show how integrate security aspects into the software engineering process. The activities … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2004
2004
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…Vetterling et al [56] propose an approach for developing secure systems evaluated under the Common Criteria. In their approach, tests covering security requirements are created manually and represented as sequence diagrams.…”
Section: Resultsmentioning
confidence: 99%
“…Vetterling et al [56] propose an approach for developing secure systems evaluated under the Common Criteria. In their approach, tests covering security requirements are created manually and represented as sequence diagrams.…”
Section: Resultsmentioning
confidence: 99%
“…Common Criteria [7,11,12] (CC) is emerging as an international standard and CC inspired security engineering frameworks have been proposed [13][14][15][16]. Proposed frameworks, however, focus on security engineering processes and fail to provide tools for developers to construct CC compliant assurance evidence.…”
Section: Experiments Setup and Justificationmentioning
confidence: 99%
“…The aim of ST is to describe the TOE itself and its security environment, security objectives, the claimed EAL, and related threats. In fact, the ST is the core document of system development based on the CC [13]. Most of the time, STs are produced by TOE developers themselves, nevertheless sometimes the CC evaluation laboratory, which is to evaluate the TOE, may help the developers through the ST preparation process.…”
Section: Overviewmentioning
confidence: 99%
“…So far, there have been a lot of efforts to make the CC more practical, comfortable, and cost effective to use. Vetterling et al in [13] show how to integrate security aspects into the software engineering process based on CC. In [10], Lee et al…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation