共 9 条
- [1] Banon M., Security evaluation, testing and specification, SC27 Security Techniques of 25 Years of Information Security Standardization (1990-2015), pp. 124-130, (2015)
- [2] Information Technology-Security Techniques-Evaluation Criteria for IT Security, (2009)
- [3] Information Technology-Security Techniques-Evaluation Criteria for IT Security, (2016)
- [4] Guideline for the development and evaluation of formal security policy models in the scope of ITSEC and Common Criteria, version 2.0 [Z/OL]
- [5] Narasamdya I., Perin M., Certification of smart-card applications in Common Criteria: Proving representation correspondences, (2008)
- [6] Schellhorn G., Reif W., Schairer A., Et al., Verification of a formal security model for multiapplicative smart cards, Lecture Notes in Computer Science, 1, 1, pp. 17-36, (2000)
- [7] Information Security Techniques-Security Technical Requirements for IC Card Chip with CPU, (2016)
- [8] ASN.1. Abstract Syntax Notation One, (2001)
- [9] Schmuller J., Sams Teach Yourself UML in 24 Hours, (2002)