Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Security Target

Common Criteria for Information Technology Security Evaluation, version 3.1 Part 1 (Called “CC 3.1” or “CC”) defines the Security Target (ST) as an… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Software architectures in the aerospace domain are becoming more and more integrated and interconnected for functional and… Expand
  • figure 2
  • figure 3
  • figure 4
2010
2010
 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2010
2010
This paper presents a novel method for designing compact yet efficient hardware implementations of the Tate pairing over… Expand
2008
2008
Mobile payment (m-payment) received significant attention because it enables an easy payment mechanism and becomes an important… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2005
2005
Evaluating information systems security is a process which involves identifying, gathering, and analysing security functionality… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
2004
2004
The changes taking place in the world today are largely due to the developments and evolution in a number of industries; one of… Expand
  • figure 1
  • figure 2
2000
2000
Abstract : This paper describes the security requirements and top level design of a network security device called the Network… Expand
  • table 6
  • table 7
  • table 8
  • table 9
  • table 10
2000
2000
Manufacturers and producers of smart card systems are all beginning to climb on the certification bandwagon. In this paper, we… Expand
  • table 1
1996
1996
In [SAND96a], the second author describes a taxonomy of role-based access control (RBAC) models, divided into four classes shown… Expand
  • figure 11-1
  • figure 11-2
  • figure 11-3
  • table 11-1
  • table 11-2
Highly Cited
1978
Highly Cited
1978