1 |
Markus Mackenbrock, 'Meeting User Needs by a Combination of Common Criteria and IT-Baseline Protection,' 3rd International Common Criteria Conference, 2002
|
2 |
Jeffrey R. Williams, Karan M. Ferraiolo, 'P3I Protection Profile Process Improvement,' 22nd National information System Security Conference, 1999
|
3 |
Jieun Lee, SungHee Lee, Byoungju Choi, 'A CC-based Security Engineering Process Evaluation Model,' 27th International Computer Software and Applications Conference (COMPSAC'2003), pp130-135, Dallas USA, 2003
|
4 |
TCSEC: Trusted Computer Evaluation Criteria, DOD5200.28STD, 1985
|
5 |
ITSEC: Information Technology Security Evaluation Criteria, V1.2, 1991
|
6 |
CC; ISO/IEC 15408 Information Technology - Security Technology - Evaluation Criteria for IT security V2.1, 1999
|
7 |
SSE-CMM: System Security Engineering Capability Maturity Model, 1999
|
8 |
BS7799 - Code of Practice for Information Security Management, British Standards Institute, 1999
|
9 |
AAWG Task I Report - An Alternative Assurance Package to the CC's EAL3 assurance level, draft v0.9, 1997
|
10 |
ISO/IEC 15443 Information technology - Security techniques - A framework for IT security assurance, 2001
|
11 |
M.M. Eloff and S.H. von Solms, 'Information Security Management: An Approach to Combine Process Certification And Product Evaluation,' Computer and Security Journal volume 19, Issue 8, Pages 698-709, 2000
DOI
ScienceOn
|