期刊文献+

基于CC安全保障要求的数据采集系统安全工程

Security Engineering for Data Acquisition System Based on CC Security Assurance Requirements
下载PDF
导出
摘要 探讨了一种基于保障范围的CC安全保障要求类层次结构,并阐述了各层次下CC安全保障要求在软件工程活动中的确立方法。在此基础上,以一个面向CC EAL3评估级的安全数据采集系统的开发活动为背景,阐述了一种结合实际软件工程活动的、基于CC安全保障类的安全工程方法。 This paper presents a layered framework of CC security assurance requirements based on the assurance scope, and the concrete corresponding assurance methods integrated with the activities in software engineering. Based on this framework, this paper explains a security engineering method based on the CC security assurance requirements, by means of case study developing secure data acquisition system according to EAL3 in CC.
出处 《计算机应用研究》 CSCD 北大核心 2006年第10期137-139,143,共4页 Application Research of Computers
基金 西安市科技攻关计划资助项目(GG05023)
关键词 数据采集系统 安全工程 通用评估准则 Data Acquisition System(DAS) Security Engineering Common Criteria(CC)
  • 相关文献

参考文献9

  • 1System Protection Profile:Industrial Control Systems[EB/OL].http://www.nist.org,2004.
  • 2The International Organization for Standardization and the Internatio-nal Electrotechnical Commission,Joint Technical Committee 1.Common Criteria for Information Technology Security Evaluation,Part1:Introduction and General Model[R].2004.
  • 3The International Organization for Standardization and the Internatio-nal Electrotechnical Commission,Joint Technical Committee 1.Common Criteria for Information Technology Security Evaluation,Part2:Security Functional Requirements[R].2004.
  • 4The International Organization for Standardization and the Internatio-nal Electrotechnical Commission,Joint Technical Committee 1.Common Criteria for Information Technology Security Evaluation,Part3:Security Assurance Requirements[R].2004.
  • 5J J Whitmore.A Method for Designing Secure Solutions[J].IBM Systems Journal,2001,40:747-768.
  • 6石文昌,孙玉芳.通过CC标准的思想确定RS-Linux的安全可信度[J].广西科学,2001,8(1):15-18. 被引量:5
  • 7Sang ho Kim,et al.A Case Study in Applying Common Criteria to Development Process of Virtual Private Network[J].Lecture Notes in Computer Science,2004,3043:608-616.
  • 8Sang Ho Kim,et al.A Case Study in Applying Common Criteria to Development Process to Improve Security of Software Products[J].Lecture Notes in Computer Science,2004,3043:1069-1077.
  • 9Tai-hoon Kim,et al.A Relationship between Security Engineering and Security Evaluation[J].Lecture Notes in Computer Science,2004,3046:717-724.

二级参考文献1

  • 1Steve Lipner.Twenty years of evaluation criteria and commercial technology[].Proceedings of the IEEE Symposium on Security and Privacy Oakland California.1999

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部