A technique for expressing IT security objectives

Jussipekka Leiwo, Lam-For Kwok, Douglas L. Maskell, Nenad Stankovic

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

1 Citation (Scopus)

Abstract

At the specification phase, the developer of an IT security product identifies and documents applicable security objectives. Specifications are often intuitive and hard to assess and while being syntactically correct may still fail to appropriately capture the security problem addressed. A technique is proposed for expressing Common Criteria compliant security environments and security objectives for high assurance IT security products. The technique is validated by an analysis of the security specification for a device computing digital signatures within the European Union PKI framework. Modifications to the specification are proposed and the possibility of extending the CC treatment of security objectives is discussed. © 2005 Elsevier B.V. All rights reserved.
Original languageEnglish
Pages (from-to)532-539
JournalInformation and Software Technology
Volume48
Issue number7
DOIs
Publication statusPublished - Jul 2006

Research Keywords

  • Common Criteria
  • Secure
  • Security objective specification
  • Signature-creation device

Fingerprint

Dive into the research topics of 'A technique for expressing IT security objectives'. Together they form a unique fingerprint.

Cite this