• Corpus ID: 2945461

Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?

@inproceedings{Gehrke1992InformationTS,
  title={Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?},
  author={Michael Gehrke and Andreas Pfitzmann and Kai Rannenberg},
  booktitle={IFIP Congress},
  year={1992}
}
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation and certification of the security of IT systems. To improve the usefulness of resulting evaluations and certificates for procurers, users, and manufacturers the ITSEC are intended to undergo further extensive review. We discuss weaknesses, remaining questions, and possible improvements concerning the current version 1… 

Tables from this paper

Recent Development in Information Technology Security Evaluation - The Need for Evaluation Criteria for Multilateral Security

  • Kai Rannenberg
  • Computer Science
    Security and Control of Information Technology in Society
  • 1993
The recent development of national and harmonised criteria and the development in the international standardisation, especially in the relevant committees of ISO and IEC are reported and analyzed.

Benchmarking the Security of Web Serving Systems Based on Known Vulnerabilities

The proposed methodology, when applied to systems within the same class, enables buyers and system integrators to identify which system or component presents the lower security risk, helping them to select which system to use.

From Trusted Information Security Controls to a Trusted Information Security Environment

This paper will provide some guidelines in the formation of a fully defined security control that will encompass all aspects of security such that no assumptions need to be made, thereby leading towards a totally secure organization.

A multi-view approach for embedded information system security

  • M. Munier
  • Computer Science
    2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS)
  • 2010
This work proposes a new approach of access control for information systems that consists in preserving several versions of the data and performing user's actions on his own view while ensuring properties on data and relationships in the repository.

Sanctus: An Architecture for Trusted Products

This work proposes an alternative to technology Balkanization by combining trustworthy engineering approaches with the use of a national security component the authors call a sanctum which together can deliver sovereign trust.

Arguing security : a framework for analyzing security requirements

This book presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requirements as constraints,

Security Requirements Engineering: A Framework for Representation and Analysis

The framework is based on constructing a context for the system, representing security requirements as constraints, and developing satisfaction arguments for the security requirements, and is evaluated by applying it to a security requirements analysis within an air traffic control technology evaluation project.

Proceedings of Workshop on Software Security Assurance Tools, Techniques, and Metrics

The goal of this workshop is to discuss and refine the taxonomy of flaws and theTaxonomy of functions, come to a consensus on which SSA functions should first have specifications and standards tests developed, gather SSA tools suppliers for “target practice” on reference datasets of code, and identify gaps or research needs in Ssa functions.
...

References

SHOWING 1-10 OF 13 REFERENCES

DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA

This publication is effective immediately and is mandatory for use by all DoD Components in carrying out ADP system technical security evaluation activities applicable to the processing and storage of classified and other sensitive DoD information and applications as set forth herein.

A survey of information authentication

The general principles that underlie all authentication schemes are reviewed and illustrated using the examples of an early telegraphy cable code, a US military authentication protocol, and

Security without identification: transaction systems to make big brother obsolete

The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.

The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities

  • D. Chaum
  • Computer Science, Mathematics
    CRYPTO
  • 1989
The proposed solutions, including those presented here, are based on two kinds of assumptions: (a) public-key cryptography; and (b) limited collusion in a setting where pairs of participants can exchange messages with secret and authenticated content.

Communication theory of secrecy systems

  • C. Shannon
  • Computer Science, Mathematics
    Bell Syst. Tech. J.
  • 1949
A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.

Reflections on trusting trust

To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.

ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead

A technique, called ISDN-Mixes, which shows thatUntraceable communication for services like telephony is often considered infeasible in the near future because of bandwidth limitations, but this is not the case.

DTI 1989_1] DTI Commercial Computer Security Centre Evaluation Manual

  • DTI 1989_1] DTI Commercial Computer Security Centre Evaluation Manual
  • 1989

Kai Rannenberg: VIS'91: IT-Sicherheit – Bewertungskriterien

  • Computer & Recht
  • 1991