Identifying Critical Components During Information Security Evaluations

@article{Rae2005IdentifyingCC,
  title={Identifying Critical Components During Information Security Evaluations},
  author={Andrew Rae and Colin J. Fidge},
  journal={Journal of Research and Practice in Information Technology},
  year={2005},
  volume={37}
}
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device’s design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known… CONTINUE READING

Similar Papers

Loading similar papers…