1 |
Stoneburner, G., "Developer-focused assurance requirements [Evaluation Assuranee Level and Common Criteria for IT system evaluation," IEEE Computer Society, Vol. 38, No.7, pp. 91-93, 2005.
|
2 |
Ware, M. S., Bowles, J. B., and Eastman, C. M., "Using the Common Criteria to Elicit Security Requirements with Use Cases," SoutheastCon, pp. 273-278, 2006.
|
3 |
http//service2.nis.go.kr.
|
4 |
Arrangement on the Recognition of Common Criteria Certificates in the field of Information Technology Security, CCRA management committee, 2000.
|
5 |
Chapman, R., "A state of the practice approach to the Common Criteria implementation requirements," 2nd Internatimal Common Criteria Conference, 2001.
|
6 |
Common Criteria, CCMB, 2007.
|
7 |
Common Criteria Portal site, http://www.commoncriteriaportal.org.
|
8 |
Common Methodology for Information Technology Security Evaluation, CCMB, 2007.
|
9 |
Fedeke, A., "Common Criteria for the assessment of critical infrastructure," International Journal of Disaster Risk Science, VoL 2, No.1, pp. 15-24, 2011.
DOI
|
10 |
Mellado, D., Fernandez-Medina, E., and Piattini, M., "A common criteria based security requirements engineering process for the development of secure information systems," Computer Standards and Interfaces, VoL 29, No.2, pp. 244-253, 2007.
DOI
|
11 |
MeIkow, M. S. and Breithaupt J., "Computer security assurance using the common criteria," Thomson, 2004.
|
12 |
Nguyen, T. D., Levin, T. E., and Irvine, C. E., "High robustness requirements in a Common Criteria protection profile Information Assurance," Information Assurance Workshop, pp. 10-78, 2006.
|
13 |
Seo, Y. J. and Han, S. Y., "An Information Flow Security Based on Protected Area in eCommerce," Journal of Society for e-Business Studies, Vol. 15, No.1, pp. 1-16, 2010.
|
14 |
Singh, M. and Patterh, M. S., "Formal Specification of Common Criteria Based Access Control Policy Model," International Journal of Network Security, Vol. 11, No.3, p. 112, 2010.
|