Security Target

Common Criteria for Information Technology Security Evaluation, version 3.1 Part 1 (Called “CC 3.1” or “CC”) defines the Security Target (ST) as an… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2001-2018
02420012018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the… (More)
Is this relevant?
Review
2014
Review
2014
The business demands cost reduction, flexible sourcing and customary quality when it comes to getting IT services. Internal and… (More)
Is this relevant?
2014
2014
Common Criteria (CC) is an international standard for evaluation and certification of IT products. Although a security target (ST… (More)
  • figure 1
  • figure 2
Is this relevant?
2013
2013
ISO/IEC 15408 is an international standard for security evaluation of information systems, and can be applied throughout the… (More)
  • figure 1
  • table I
  • table III
  • figure 2
  • figure 3
Is this relevant?
2012
2012
To acquire the certification according to ISO/IEC 15408 for a target system, it is necessary to create a security target (ST… (More)
  • figure 2
  • figure 1
  • figure 3
  • table I
  • figure 5
Is this relevant?
2010
2010
This paper presents a novel method for designing compact yet efficient hardware implementations of the Tate pairing over… (More)
Is this relevant?
2010
2010
In this paper, we study a network security configuration problem. More specifically, we consider distributed intrusion detection… (More)
Is this relevant?
2009
2009
Security of software systems has become one of the biggest concerns in our everyday life, since software systems are increasingly… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
Evaluating information systems security is a process which involves identifying, gathering, and analysing security functionality… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2004
2004
The evaluation of information systems security is a process in which the evidence for assurance is identified, gathered, and… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?