Browse > Article

고등급 평가 기술 : 정형화 기법 개요  

Sim, Jae-Hwan (고려대학교 정보통신대학 컴퓨터.통신공학부)
Kim, Hyun-Seok (고려대학교 정보통신대학 컴퓨터.통신공학부)
Yoo, Hee-Jun (한국정보보호진흥원 보안성평가단)
Choi, Jin-Young (고려대학교 정보통신대학 컴퓨터.통신공학부)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 'Common Criteria for Information Technology Security Evaluation', Ver 3.1, September 2006, CCMB-2006-09-003
2 Woodcook, J. Davies, J., 'Using Z : Specification, refinement, and proof' Prentice-Hall, Inc. Upper Saddle River, NJ, USA, 1996
3 Frank Koob, Markus Ullmann, Stefan Wittmann, 'The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process', Lecture Note in Computer Science, Springer, LNCS 1641, pp. 302-310, 1998
4 Junkil Park, Jin-Young Choi,'Formal Security Policy Model for a Common Criteria Evaluation', ICACT 2007, Korea, February 2007, pp. 277-281
5 R. Richards, D. Greve, M. Wilding, W. Mark Vanfleet, 'The Common Criteria, Formal Methods, and ACL2,' ACL2 Workshop 2004
6 Mark S. Merkow and Jim Breihaupt, Computer security assurance using the common criteria, Thomson/Delmar Learning, Clifton Park, NY, 2005
7 Information Technology Security Evaluation Criteria, Office for Official Publications of the European Communities, Lexembourg 1991