Browse > Article

Document Schema for the CC-based evaluation of information technology security system  

Kim, Jeom-Goo (남서울대학교 컴퓨터학과)
Publication Information
Abstract
CC does not Contain detailed instructions about evaluation document. So, we must develop document schema to make CC-based evaluation system. In this report, we developed document schema that can be used in CC-based evaluation system. We devloped document schema and DTD that applying Weakest precondition function, reduction rules about amount of document and dependancy analysis document from assurance class within CC. Approach of this study can be applied to develop document and DTD that can be used in evaluation system of software quality.
Keywords
Security; CC-based; Document schema;
Citations & Related Records
연도 인용수 순위
  • Reference
1 CCEB, "Common Criteria for Information Technology Security Evaluation(CC)," Version 2.1, CC IMB-99-033, http://csrc.ncsl.gov, August 1999. (정보보호시스템 공통평가기준, 정보통신부, 2002. 8과 내용 동일)
2 ISO/IEC PDTR 15446, "Information technology - Security techniques - Guide for the production of protection profiles and security targets", Draft, Apr 3, 2000.
3 CCEB, "Common Evaluation Methodology for Information Technology Security," Part1,2(Version 1.0, CEM-99/045), http://csrc.ncsl.gov.
4 E. W. Dijkstra, "A Discipline of Programming," Prentice-Hall, 1976.
5 한국정보보호진흥원, "국제공통평가기준 기반의 평가제출물 작성법연구," 수탁기관: 한남대학교, 2001.10.
6 조완수, "소프트웨어 개발 및 문서화 관리론," 법영사, 1998.
7 정보통신부, "정보통신망 침입차단시스템 평가기준," 정보통신부, 2000년 2월 17일 개정 및 고시, http://www.kisa.or.kr.
8 D. Meggison, "Structuring XML Documents," The definitive XML series from C.F.Goldfarb, 1998.
9 S. L. Pfleeger, "Software Engineering Theory and Practice," Prentice-Hall, Ch. 11, 1998.
10 European Communication, "Information Technol ogy Security Evaluation Manual(ITSEM)," Ver 1.2, http://www.itsec.gov.uk, June 1993.
11 UK-ITSEC Scheme, "Developers' Guide," UKS P 04, http://www.itsec.gov.uk, 1996.