Supporting Verification and Validation of Security Targets with ISO/IEC 15408

被引:0
|
作者
Bao, Da [1 ]
Miura, Junichi [1 ]
Zhang, Ning [1 ]
Goto, Yuichi [1 ]
Cheng, Jingde [1 ,2 ]
机构
[1] Saitama Univ, Dept Informat & Comp Sci, Saitama 3388570, Japan
[2] Tianjin Univ, Sch Comp Sci & Technol, Tianjin 300072, Peoples R China
关键词
information security; ISO/IEC; 15408; 18045; security target; verification and validation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
ISO/IEC 15408 is an international standard for security evaluation of information systems, and can be applied throughout the software life cycle to improve security of information systems. A Security Target, which contains specifications of security functions of the target system, is the most important document in development of the system according to ISO/IEC 15408. Verification and Validation of Security Targets must be strictly performed before development of the system. This paper analyzed and clarified 168 targets that Security Targets must satisfy based on ISO/IEC 18045, and the procedures of examining those targets are also provided. Then the paper proposes comprehensive methods to support verification and validation of Security Targets. With these methods, we can implement comprehensive supporting tools for verification and validation of Security Targets.
引用
收藏
页码:2621 / 2628
页数:8
相关论文
共 50 条
  • [1] Development of Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045
    Bao, Da
    Sun, Wen
    Goto, Yuichi
    Cheng, Jingde
    [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 204 - 209
  • [2] A Supporting Tool for IT System Security Specification Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045
    Bao, Da
    Goto, Yuichi
    Cheng, Jingde
    [J]. TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING: PAKDD 2019 WORKSHOPS, 2019, 11607 : 3 - 14
  • [3] FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408
    Yajima, Kenichi
    Morimoto, Shoichi
    Horie, Daisuke
    Azreen, Noor Sheila
    Goto, Yuichi
    Cheng, Jingde
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 624 - +
  • [4] Advanced Security Assurance Case Based on ISO/IEC 15408
    Potii, Oleksandr
    Illiashenko, Oleg
    Komin, Dmitry
    [J]. THEORY AND ENGINEERING OF COMPLEX SYSTEMS AND DEPENDABILITY, 2015, 365 : 391 - 401
  • [5] GEST: A Generator of ISO/IEC 15408 Security Target Templates
    Horie, Daisuke
    Yajima, Kenichi
    Azimah, Noor
    Goto, Yuichi
    Cheng, Jingde
    [J]. COMPUTER AND INFORMATION SCIENCE 2009, 2009, 208 : 149 - 158
  • [6] A security requirement management database based on ISO/IEC 15408
    Morimoto, S
    Horie, D
    Cheng, JD
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 1 - 10
  • [7] Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408
    Lee, Eun-Ser
    Kim, Haeng-Kon
    Hwang, Sun-Myoung
    [J]. SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 25 - +
  • [8] Supporting Tools for Software Supportable Tasks Related with ISO/IEC 15408
    Zhang, Ning
    Bao, Da
    Xu, Liqing
    Suhaimi, A. I. H.
    Miura, Junichi
    Goto, Yuichi
    Cheng, Jingde
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2002 - 2006
  • [9] Challenges and Opportunities in the Information Systems Security Evaluation and Position of ISO/IEC 15408
    Vali, Nasser
    Modiri, Nasser
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 321 - +
  • [10] An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology
    Cha, Shi-Cho
    Yeh, Kuo-Hui
    [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,