While COTS products can be made secure and reliable within a individual domains, they may introduce security vulnerabilities when integrated with other components due to different security expectations. These problematic interactions within an integrated system can be hidden among the multiple, contributing policy types. Furthermore, security certification criteria governing the integrated system can introduce conflicts with local component policies. Security policies and certification criteria lack a common representation. Security policies use various formats and levels of granularity without comparable attributes. Certification criteria are often text-based checklists. We outline a policy configuration model to represent security policie...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
We describe compositional architectures and certifications in the research project certMILS. Composi...
Security policies determine which security requirements have to be met in a domain and how they are ...
Abstract. Component-based software has become a mainstream practice as organizations attempt to stre...
this report it is trusted to meet the security specifications. In some other context it might be tru...
The Common Criteria (CC) certification framework defines a widely recognized, multi-domain certifica...
In the focus of the certMILS project are cyber physical systems (CPS). These combine physical and so...
System security assurance provides the confidence that security features, practices, procedures, and...
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenge
Using software components to develop mission-critical systems poses a number of technical, organizat...
Common Criteria is a scheme that minimize IT products’s vulnerabilities in accordance with the evalu...
Abstract: In 2012 the two open source projects CESeCore and EJBCA were Common Criteria certified [CC...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
This Protection Profile ‘Multiple Independent Levels of Security: Operating System (MILS PP: Operati...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
We describe compositional architectures and certifications in the research project certMILS. Composi...
Security policies determine which security requirements have to be met in a domain and how they are ...
Abstract. Component-based software has become a mainstream practice as organizations attempt to stre...
this report it is trusted to meet the security specifications. In some other context it might be tru...
The Common Criteria (CC) certification framework defines a widely recognized, multi-domain certifica...
In the focus of the certMILS project are cyber physical systems (CPS). These combine physical and so...
System security assurance provides the confidence that security features, practices, procedures, and...
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenge
Using software components to develop mission-critical systems poses a number of technical, organizat...
Common Criteria is a scheme that minimize IT products’s vulnerabilities in accordance with the evalu...
Abstract: In 2012 the two open source projects CESeCore and EJBCA were Common Criteria certified [CC...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
This Protection Profile ‘Multiple Independent Levels of Security: Operating System (MILS PP: Operati...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
We describe compositional architectures and certifications in the research project certMILS. Composi...
Security policies determine which security requirements have to be met in a domain and how they are ...