Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2006-01
Add to Favorite Get Latest Update

Survey of Common Criteria Evaluation

LIU Wei1,2,ZHANG Yuqing1,2,FENG Dengguo1,2(1.State Key Laboratory of Information Security,Graduate School of Chinese Academy of Sciences,Beijing 100039;2.National Computer Network Intrusion Protection Center,Graduate School of Chinese Academy of Sciences,Beijing 100039)  
Common criteria(CC) is the world most comprehensive evaluation criteria for the security of information technology.Based on the introduction to the development of CC home and abroad,the paper analyzes systematically the basic concepts of CC,its main idea,and evaluation roles and types.It also discusses a method named CEM and its evaluation flow in detail.Finally,the paper presents some existing problems and future research trend of CC evaluation on the basis of a summary of CC evaluation status.
【Fund】: 国家“863”计划基金资助资助(2002AA142151)
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 LIU Yan(Puyang Vocational &Technical College, Puyang 457000,China);Improved information security risk assessment model research[J];Journal of Changchun Institute of Technology(Natural Sciences Edition);2012-01
Chinese Journal Full-text Database 1 Hits
1 XIAO Gang(Automatic Research Center in No 61. Institute,Beijing 100039);Current and Future of Information Technology Security Criteria Standards[J];Computer Engineering;2001-07
Chinese Journal Full-text Database 4 Hits
1 LIU Wei1,2,ZHANG Yuqin1,2,FENG Denguo1,2(1.Nationasl Key Lab of Information Security(Graduate School of CSA),Beijing 100039;2.National Center for Defence of Computer Network Intruction,Graduate School of CSA,Beijing 100039);Design and Implementation of Common Criteria Evaluation Tool for System Security[J];Computer Engineering;2006-04
2 Qiu hengbiao Tobacco Fujian Sanming Branch,365000;On the offi ce network security and security policy[J];China Computer & Communication;2009-09
3 Liu Xiongbing Jiangshan Power Supply Bureau,Zhejiang Province 324100;The office network security and security policy[J];China Computer & Communication;2009-11
4 LIU Li CUI Yimin (Beijing Institution of System Engineering,Beijing 100094,China);Research and Implementation of Synthesis Evaluation Technology for Network Security State[J];Journal of the Academy of Equipment Command & Technology;2006-06
Chinese Journal Full-text Database 10 Hits
1 FENG Ping (College of Managenent,Xi'an Jiantong University,Xi an 710040,China);On the changes and countermeasures of international trade under E-commerce environment[J];Journal of Anhui Normal University(Philosophy & Social Sciences);2002-02
2 DUAN Yunsuo LIU Xin CHEN Zhong (Department of Computer Science and Technology, School of Electronics Engineering and Computer Science, Peking University, Beijing, 100871);Analysis on Combined Security Efficiency and Vulnerability for Information System Security Evaluation[J];Acta Scicentiarum Naturalum Universitis Pekinesis;2005-03
3 LIANG Si~1,LIU Jia-yong~1,HU Yong~1,CHEN Bo~2(1.Institute of Information Security,SCU,Chengdu 610064,China;2.Dept.of Communication & Information System,SCU,Chengdu 610065,China);Analysis of firewall security function based on CC[J];Journal of Chengdu University of Information Technology;2006-04
4 LUO Qiao-yun (The Electronic 10th Institute of Ministry of Information Industry,Chengdu 610036,China);Review on the Integrated Avionics System of F-22 "Raptor[J];Telecommunication Engineering;2002-04
5 WANG Li-jie,XIONG Guang-ze,LUO Lei (School of Computer Science and Engineering, UEST of China Chengdu 610054);Research and Implementation of the Safety Protect Scheme for Embedded Real Time Operation System[J];Journal of University of Electronic Science and Technology of China;2005-05
6 LI Wei-ying~1,GAO Qiang~2,TIAN Jie~3(1.Dept.of Information Science and Technical Institute,Hebei Agricultural College,Baoding 071002,China;2.Dept.of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China;3.Tianjin Electric Power Company,Tianjin 300010,China);Research on security evaluation engineering process based on SSE-CMM[J];Telecommunications For Electric Power System;2005-12
7 LIU Man-hua1, LIU ping2 (1.Zhoukou Normal University,Zhoukou 466001,China;2.Institute of Electronic Technology,The PLA Information Engineering University,Zhengzhou 450004,China);The Methods of Quantitative Analysis and Qualitative Analysis of Information Security Risk Assessment[J];Computer Knowledge and Technology;2006-11
8 YANG Fu-qing, MET Hong, LU Jian, JIN Zhi(Software Institute, Peking University, Beijing 1000871, China;National Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu 210096, China;Mathematics Institute, Chinese Academy of Sciences , Beijing 100080, China);Some Discussion on the Development of Software Technology[J];Acta Electronica Sinica;2002-S1
9 CHEN Huo-wang,WANG Ji,Dong Wei (School of Computer,National University of Defense Technology,Changsha,Hunan 410073,China);High Confidence Software Engineering Technologies[J];Acta Electronica Sinica;2003-S1
10 CHEN Chi,FENG Deng-guo,XU Zhen(State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100080,China);A Research on Quantitative Evaluation the Assurance of Information Security Products[J];Acta Electronica Sinica;2007-10
【Secondary References】
Chinese Journal Full-text Database 3 Hits
1 Wu Xiaojuan et al;Web Service Security Risk Assessment and Design of Its Aids Tool[J];Computer Development & Applications;2008-05
2 SONG Jia-sheng,ZHANG Shu-na (School of Economics and Management,Harbin University of Science and Technology,Harbin 150040,China);Study on implementation effect of informationization manufacturing technology[J];Science-Technology and Management;2008-03
3 PAN Heng1,2,XIE Yan-bin1,2(1.Zhongyuan University of Technology,Zhengzhou 450007; 2.Zhengzhou Key Lab of Computer Network Security Assessment,Zhengzhou 450007,China);Research of Web Application Security Risk Assessment[J];Journal of Zhongyuan University of Technology;2011-06
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 ;An Analysis of the International Common Criteria for Information Technology Security Evaluation[J];Computer Science;2001-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved