Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,399,327 papers from all fields of science
Search
Sign In
Create Free Account
ITSEC
Known as:
Information Technology Security Evaluation Criteria
The Information Technology Security Evaluation Criteria (ITSEC) is a structured set of criteria for evaluating computer security within products and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Common Criteria
Interactive Link
Jim Woodcock
Mondex
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Efficient Implementation of Simulation Support for Tactical-Level Military Training
J. Brynielsson
,
Sinna Lindquist
,
L. Luotsinen
2016
Corpus ID: 16793156
Computer-based games and simulations provide the means for practicing essential elements of combat which in a realistic exercise…
Expand
2013
2013
Experiences from security research using a Wireless Mesh Network testbed
André Egners
,
Patrick Herrmann
,
Tobias Jarmuzek
,
Ulrike Meyer
38th Annual IEEE Conference on Local Computer…
2013
Corpus ID: 15111872
Wireless Mesh Networks (WMN) consist of a wireless infrastructure of mesh routers which are connected to the Internet via mesh…
Expand
2011
2011
Validation and verification of IEEE 1588 Annex K
B. Hirschler
,
A. Treytl
IEEE International Symposium on Precision Clock…
2011
Corpus ID: 12674697
The Precision Time Protocol (PTP) specified by IEEE 1588 contains a security extension to properly protect the exchanged…
Expand
2009
2009
LoI: Efficient relevance evaluation and filtering for distributed simulation
Zhong Zhou
,
Wei Wu
Science in China Series F: Information Sciences
2009
Corpus ID: 3464368
In large-scale distributed simulation, thousands of objects keep moving and interacting in a virtual environment, which produces…
Expand
2007
2007
Integrated Software Vulnerability and Security Functionality Assessment
Xiangrong Wang
,
Hang Shi
,
Tze-Yau William Huang
,
F. C. Lin
IEEE International Symposium on Software…
2007
Corpus ID: 14079246
Product security is an on-going challenge for network equipment vendors. In this paper, we present a systematic methodology for…
Expand
2001
2001
SPARK — a state-of-the-practice approach to the Common Criteria implementation requirements
R. Chapman
2001
Corpus ID: 11527841
The Common Criteria (CC) require the use of programming languages whose statements have an "unambiguous meaning." This…
Expand
1996
1996
Formal techniques for an ITSEC-E4 secure gateway
P. Bieber
Proceedings 12th Annual Computer Security…
1996
Corpus ID: 10588352
We describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally…
Expand
1996
1996
NetWare 4 as an example of role-based access control
J. Epstein
,
R. Sandhu
ACM Workshop on Role-Based Access Control
1996
Corpus ID: 30333141
In [SAND96a], the second author describes a taxonomy of role-based access control (RBAC) models, divided into four classes shown…
Expand
1994
1994
Traffic characterization of manned-simulators and computer generated forces in DIS exercises
S. Cheung
,
M. Loper
Fifth Annual Conference on AI, and Planning in…
1994
Corpus ID: 17924324
Distributed interactive simulation (DIS) is an ambitious attempt to seamlessly integrate heterogeneous simulators of various…
Expand
1992
1992
Piloting Authentication and Security Services within OSI Applications for RTD Information (PASSWORD)
P. Kirstein
,
P. Williams
Comput. Networks ISDN Syst.
1992
Corpus ID: 38340876
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE