TY - JOUR
T1 - A technique for expressing IT security objectives
AU - Leiwo, Jussipekka
AU - Kwok, Lam-For
AU - Maskell, Douglas L.
AU - Stankovic, Nenad
PY - 2006/7
Y1 - 2006/7
N2 - At the specification phase, the developer of an IT security product identifies and documents applicable security objectives. Specifications are often intuitive and hard to assess and while being syntactically correct may still fail to appropriately capture the security problem addressed. A technique is proposed for expressing Common Criteria compliant security environments and security objectives for high assurance IT security products. The technique is validated by an analysis of the security specification for a device computing digital signatures within the European Union PKI framework. Modifications to the specification are proposed and the possibility of extending the CC treatment of security objectives is discussed. © 2005 Elsevier B.V. All rights reserved.
AB - At the specification phase, the developer of an IT security product identifies and documents applicable security objectives. Specifications are often intuitive and hard to assess and while being syntactically correct may still fail to appropriately capture the security problem addressed. A technique is proposed for expressing Common Criteria compliant security environments and security objectives for high assurance IT security products. The technique is validated by an analysis of the security specification for a device computing digital signatures within the European Union PKI framework. Modifications to the specification are proposed and the possibility of extending the CC treatment of security objectives is discussed. © 2005 Elsevier B.V. All rights reserved.
KW - Common Criteria
KW - Secure
KW - Security objective specification
KW - Signature-creation device
UR - http://www.scopus.com/inward/record.url?scp=33646499426&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-33646499426&origin=recordpage
U2 - 10.1016/j.infsof.2005.05.008
DO - 10.1016/j.infsof.2005.05.008
M3 - RGC 21 - Publication in refereed journal
SN - 0950-5849
VL - 48
SP - 532
EP - 539
JO - Information and Software Technology
JF - Information and Software Technology
IS - 7
ER -