期刊文献+

通过CC标准的思想确定RS-Linux的安全可信度 被引量:5

Determining Confidence in Security of RS-Linux Through Concepts of the Common Criteria
下载PDF
导出
摘要 以一个称为 RS- L inux的安全操作系统的研制工作为实验手段 ,对按照 CC标准的思想开发安全产品的方法进行研究 ,并以该项研究为基础 ,探讨从 On the basis of a research work conducted to develop a secure operating system named RS Linux in line with the CC concepts.The investigation is conducted on what way that confidence in security may be determined in the methodologies implied in the CC framework.
出处 《广西科学》 CAS 2001年第1期15-18,共4页 Guangxi Sciences
基金 国家 8 6 3高科技项目!(86 3-30 6 -ZD12 -14 -2 ) 国家自然科学基金项目!(6 0 0 730 2 2 ) 中国科学院知识创新工程项目!(KGCX1-0 9
关键词 安全可信度 安全工程 共同标准 安全操作系统 安全系统开发 RS-Linux CC标准 confidence in security, security engineering, common criteria, secure operating systems,development of secure systems
  • 相关文献

参考文献1

  • 1Steve Lipner.Twenty years of evaluation criteria and commercial technology[].Proceedings of the IEEE Symposium on Security and Privacy Oakland California.1999

同被引文献35

  • 1GennickJ McCullough—DieterCGerrit—JanL 赵艳勤 刘冠英 秦玉.Oracle8i DBA宝典[M].北京:电子工业出版社,2000..
  • 2Argus Systems Group. Trusted OS security: Principles and practice[ EB/OL]. http://www. argus- systems. com/products/white-paper/pitbull, 2004 - 01 - 12.
  • 3Spencer R,et al.The flask security architecture:system support for diverse security policies[Z].2001.
  • 4GB17859-1999.计算机信息系统安全保护等级划分准则[S].[S].,1999..
  • 5System Protection Profile:Industrial Control Systems[EB/OL].http://www.nist.org,2004.
  • 6The International Organization for Standardization and the Internatio-nal Electrotechnical Commission,Joint Technical Committee 1.Common Criteria for Information Technology Security Evaluation,Part1:Introduction and General Model[R].2004.
  • 7The International Organization for Standardization and the Internatio-nal Electrotechnical Commission,Joint Technical Committee 1.Common Criteria for Information Technology Security Evaluation,Part2:Security Functional Requirements[R].2004.
  • 8The International Organization for Standardization and the Internatio-nal Electrotechnical Commission,Joint Technical Committee 1.Common Criteria for Information Technology Security Evaluation,Part3:Security Assurance Requirements[R].2004.
  • 9J J Whitmore.A Method for Designing Secure Solutions[J].IBM Systems Journal,2001,40:747-768.
  • 10Sang ho Kim,et al.A Case Study in Applying Common Criteria to Development Process of Virtual Private Network[J].Lecture Notes in Computer Science,2004,3043:608-616.

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部