Browse > Article

복합 기능을 갖는 정보보호 제품의 보호 프로파일 개발을 위한 평가 방법론 고찰  

서대희 (순천향대학교 정보기술공학부)
이임영 (순천향대학교 정보기술공학부)
정지훈 (국가보안기술연구소)
채수영 (국가보안기술연구소)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 /
[ The Common Evaluation Methodology(CEM) Editorial Board(CEMEB) ] / Common Criteria for Information Technology Security Evaluation(Version 2.0)
2 /
[ NIST ] / Conformance testing
3 Information technology - Open Systems Interconection - Conformance testing methodology and framework - Part 1 : General concepts /
[] / ISO/IEC 9646-1
4 /
[ NSA ] / Key Recovery Agent System Protection Profile
5 /
[ NSA ] / Key Recovery End System Protection Profile
6 Information technology - Telecommunications and information exchange between systems - Open Systems Interconnection - Protocol for providing the connection-mode transport service /
[] / ISO/IEC 8073
7 /
[ 김영백 ] / 암호모듈평가기술-표준적합성-
8 /
[ 장청룡 ] / 표준화동향 특집:정보보호제품의 표준적합성 시험과 인증
9 /
[ The Common Evaluation Methodology(CEM) Editorial Board(CEMEB) ] / Common Methodology for Information Technology Security Evaluation(Version 1.0)
10 /
[ D.Gowin ] / RFC 1708 - NTP PICS PROFORMA For the Network Time
11 Information technology - Telecommunication and information exchange between systems - Transport conformance testing for connection-mode transport protocol operating over connection mode network services - Part 2 : Test suite structure and test purposes /
[] / ISO/IEC 10025-2
12 /
[ National Physical Laboratory ] / The UK's national Standards Laboratory for Physical Measurement
13 Information technology - Open Systems Interconnection - Conformance testing methodology and framework - Part 2 : Abstract Test Suite specification /
[] / ISO/IEC 9646-2
14 Information technology - Security techniques - A framework for IT security assurance /
[ ISO/IEC ] / ISO/IEC WD 15443
15 Information technology - Open Systems Interconnection - Conformance testing methodology and framework - Part 3 : The Tree and Tabular Combined Notation /
[] / ISO/IEC 9646-3
16 /
[ NSA ] / Key Recovery Third Party Requestor Protection Profile
17 /
[ The Common Evaluation Methodology(CEM) Editorial Board(CEMEB) ] / Common Methodology for Information Technology Security Evaluation(Version 0.6)
18 /
[ Office for Official Publications of the European Communities ] / Information Technology Security Evaluation Criteria(ITSEC)
19 Common Criteria for information Technology Security Evaluation /
[] / Common Criteria Editorial Board
20 /
[ NIST ] / Conformance Requirements Guideline
21 /
[ Office for Official Publications of the European Communities ] / Information Technology Security Evaluation Manual(ITSEM)
22 /
[ NPL ] / Strict Conformance Testing