INFORMATION TECHNOLOGY SECURITY EVALUATION CRITERIA (ITSEC) - A CONTRIBUTION TO VULNERABILITY

被引:0
作者
GEHRKE, M [1 ]
PFITZMANN, A [1 ]
RANNENBERG, K [1 ]
机构
[1] UNIV HILDESHEIM, INST INFORMAT, W-3200 HILDESHEIM, GERMANY
来源
IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY | 1992年 / 13卷
关键词
THE COMPUTING PROFESSION; CERTIFICATION; AND LICENSING; MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS; SECURITY AND PROTECTION; OPERATING SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation and certification of the security of IT systems. To improve the usefulness of resulting evaluations and certificates for procurers, users, and manufacturers the ITSEC are intended to undergo further extensive review. We discuss weaknesses, remaining questions, and possible improvements concerning the current version 1.2 of ITSEC. Our criticism focusses on the intended scope, the functionality aspects, the assessment of effectiveness and correctness, and problems arising after the evaluation of IT systems. Additionally, the ITSEC development and the accompanying discussion are criticized and improvements are proposed
引用
收藏
页码:579 / 587
页数:9
相关论文
共 18 条
  • [1] Burk H., 1990, Computers & Security, V9, P715, DOI 10.1016/0167-4048(90)90114-9
  • [2] CHAUM D, 1985, COMMUN ACM, V28, P1030, DOI 10.1145/4372.4373
  • [3] CHAUM D, 1990, LECT NOTES COMPUT SC, V435, P591
  • [4] DIERSTEIN R, 1990, 1990 IFIP SEC 90
  • [5] PFITZMANN A, 1991, 1991 P IFIP SEC 91 B, P245
  • [6] PFITZMANN A, 1991, STATEMENT OBSERVATIO
  • [7] RANNENBERG K, 1991, COMPUTER RECH, V7, P699
  • [8] Rihaczek K., 1991, Computers & Security, V10, P101, DOI 10.1016/0167-4048(91)90003-V
  • [9] COMMUNICATION THEORY OF SECRECY SYSTEMS
    SHANNON, CE
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04): : 656 - 715
  • [10] A SURVEY OF INFORMATION AUTHENTICATION
    SIMMONS, GJ
    [J]. PROCEEDINGS OF THE IEEE, 1988, 76 (05) : 603 - 620