期刊文献+

基于逻辑关系和约束的保护轮廓生成模型研究 被引量:1

A PROTECTION PROFILE GENERATION MODEL BASED ON LOGIC RELATIONS AND RESTRICTIONS
下载PDF
导出
摘要 提出一个基于逻辑关系和约束的保护轮廓生成模型。通过分析保护轮廓的组成结构、生成原理,总结了保护轮廓的内在逻辑关系和约束条件,给出了保护轮廓生成过程和相关自动化处理算法。最后,讨论了生成模型在安全保护等级划分准则要求下的应用。 A PP( Protection Profile) generation model based on logic relations and restrictions is proposed. The PP structure and the generation principle are described, and the innate logic relations and restrictions of PP are analyzed. The algorithm for PP generation and the related automation process algorithm are presented. Finally, the application of the generation model under the PP rank partition criteria is discussed.
出处 《计算机应用与软件》 CSCD 北大核心 2008年第3期1-3,11,共4页 Computer Applications and Software
基金 国家自然科学基金(60773170,60721002,60473053) 国家863计划(2006AA01Z432,2004AA147070) 江苏省自然科学基金(BK2005074)
关键词 保护轮廓 逻辑关系 约束 通用评估准则 GB17859 Protection profile Logic relation Restriction Common criteria GB17859
  • 相关文献

参考文献12

  • 1ISO/IEC 15408 : 1999 ( E). The International Organization for Standardization. Common Criteria for Information Technology security Evaluation.
  • 2Information Technology-Security Techniques-Guide for the Production of Protection Profiles and Security Targets. ISO/IEC TR 15446,2003.
  • 3GB/T 18336-2001.信息技术,安全技术,信息技术安全性评估准则.
  • 4COTS Security Protection Profile-Operating Systems v1. 0. US Department of Commerce, Technology Administration and National Institutes of Standards and Technology ,2003.
  • 5Validated Protection Profile, http ://niap. nist. gov/cc-scheme/pp/index. html.
  • 6GB/T 17859-1999.计算机信息系统安全保护等级划分准则.
  • 7GA/T 390-2002.计算机信息系统安全等级保护通用技术要求.
  • 8GA/T 388-2002.计算机信息系统安全等级保护操作系统技术要求.
  • 9Consistency Instruction Manual for Development of US Government Protection Profiles for Use in Basic Robustness Environments, v3.0. National Security Agency and the National Institutes of Standards and Technology, 2005.
  • 10Consistency Instruction Manual for Development of US Government Protection Profiles for Use in Medium Robustness Environments, v3.0. National Security Agency and the National Institutes of Standards and Technology, 2005.

同被引文献7

  • 1陈轶佳,周安民,方勇,王炜,曹军.信息安全产品测评系统研究与实现[J].计算机应用研究,2005,22(2):100-101. 被引量:2
  • 2GB/T18336-2001信息技术安全性评估准则[s].中华人民共和国国家标准局,2001.
  • 3ISO/IEC TR 15446 Information Technology-Security Techniques-Guide for the Production of Protection Profiles and Security Targets. http:// www. iso. org/iso/catalogue_detail. htm.
  • 4Jeffrey R Williams, Karen M Ferraiolo. Protection Profile Process Improvement [ R ]. Arca Systems, Inc, 1999.
  • 5John P Hopkinson. System Security Engineering Capability Maturity Model[ R./OL]. http://www. sse-cmm.org/docs/sse-cmm. pdf.
  • 6National Security Agency and the National Institutes of Standards and Technology. Consistency Instruction Manual for Development of US Government Protection Profiles for Use in Basic Robustness Environments [ RJOL ]. http ://www. niap-ccevs.org/pp/bas_rob_manual-3. 0. pdf.
  • 7National Security Agency and the National Institutes of Standards and Technology. Consistency Instruction Manual for Development of US Government Protection Profiles for Use in Medium Robustness Environments [ R/OL]. http ://www. niap-ccevs. org/pp/med_rob_manual-3.0. pdf.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部