共 50 条
- [1] Analyse of the security architecture and policy model in the Common Criteria [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2016, 56 (05): : 493 - 498
- [2] Formal Verification of Security Specifications with Common Criteria [J]. APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1506 - +
- [4] A NETWORK SECURITY EVALUATION MODEL BASED ON COMMON CRITERIA [J]. 2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 416 - 420
- [5] A formal model of Healthcare Security Policy [J]. TOWARD AN ELECTRONIC PATIENT RECORD '97 - CONFERENCE AND EXPOSITION, PROCEEDINGS, VOLS 1-3, 1997, : B181 - B196
- [6] FESR: A Framework for Eliciting Security Requirements based on Integration of Common Criteria and Weakness Detection Formal Model [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS), 2017, : 352 - 363
- [7] Research on formal security policy model specification and its formal analysis [J]. Tongxin Xuebao, 2006, 6 (94-101):
- [8] A formal model for data storage security evaluation [J]. ICCSA 2007: Proceedings of the Fifth International Conference on Computational Science and Applications, 2007, : 253 - 257
- [9] Evaluation model for computer security software products based on ISO/IEC 15408 Common Criteria [J]. SISTEMAS & TELEMATICA, 2011, 9 (19): : 69 - 92
- [10] A common criteria framework for the evaluation of information technology systems security [J]. INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 197 - 209