Bernd Kowalski

Learn More
  • Programm Hauptförderer, Weitere Förderer, +47 authors Hdl Michael Hoffmann
  • 1999
Zusammenarbeit mit dem Fachbereich 5 der Gesellschaft für Informatik e.V. und der Wissenschaftlichen Kommission Wirtschaftsinformatik (WKWI) im Verband der Hochschullehrer für Betriebswirtschaft e.V.
Diee Card-Strategie zielta uf dieH armonisierung deru nterschiedlichen Projekte derB undesregierung ab,d ie Chipkarten (eCards) mitA uthentisierungs-und Signaturfunktionh erausgeben odern utzen.D er vorliegende Beitrag liefert einenkompakten Überblicküberdie wesentlichenAspekte dereCard-Strategie. 1Einleitung Das Bundeskabinett hata m9 .M ärz2 005d ie(More)
The IT product identified in this certificate has been evaluated at an accredited and licensed / approved evaluation facility using the Common Methodology for IT Security Evaluation, Version 2.3 for conformance to the Common Criteria for IT Security Evaluation (CC), Version 2.3 (ISO/IEC 15408:2005). This certificate applies only to the specific version and(More)
The IT product identified in this certificate has been evaluated at an accredited and licensed / approved evaluation facility using the Common Methodology for IT Security Evaluation (CEM), Version 3.1 for conformance to the Common Criteria for IT Security Evaluation (CC), Version 3.1. This certificate applies only to the specific version and release of the(More)
The IT product identified in this certificate has been evaluated at an accredited and licensed / approved evaluation facility using the Common Methodology for IT Security Evaluation, Version 2.3 extended by advice of the Certification Body for components beyond EAL 4 and guidance specific for the technology of the product for conformance to the Common(More)
The Protection Profile identified in this certificate has been evaluated at an accredited and licensed/ approved evaluation facility using the Common Methodology for IT Security Evaluation (CEM), Version 3.1 for conformance to the Common Criteria for IT Security Evaluation (CC), Version 3.1. This certificate applies only to the specific version and release(More)
The IT product identified in this certificate has been evaluated at an accredited and licensed / approved evaluation facility using the Common Methodology for IT Security Evaluation, Version 2.3 extended by advice of the Certification Body for components beyond EAL 4 and guidance specific for the technology of the product for conformance to the Common(More)
The IT product identified in this certificate has been evaluated at an accredited and licensed / approved evaluation facility using the Common Methodology for IT Security Evaluation, Version 2.3 for conformance to the Common Criteria for IT Security Evaluation (CC), Version 2.3 (ISO/IEC 15408:2005). This certificate applies only to the specific version and(More)
The IT product identified in this certificate has been evaluated at an accredited and licensed / approved evaluation facility using the Common Methodology for IT Security Evaluation, Version 2.3 extended by advice of the Certification Body for components beyond EAL 4 and guidance specific for the technology of the product for conformance to the Common(More)