DocumentCode
491933
Title
Security Policy Modeling using Z notation for Common Criteria version 3.1
Author
Park, Junkil ; Choi, Jin-Young
Author_Institution
Theor. & Formal Methods Lab.
Volume
01
fYear
2009
fDate
15-18 Feb. 2009
Firstpage
137
Lastpage
142
Abstract
The common criteria for information technology security evaluation (CC) is an international standard for evaluating secure computer systems. To obtain high evaluation assurance level, CC requires formalism in the development class. In the security policy modeling of CC v3.1, the use of formal methods is mandatory. This paper gives a guideline for developing formal security policy model with Z notation in CC v3.1. We compare CC v3.1 to CC v2.3 with respect to security policy model. We explain a structure of formal security policy model written in Z, and provide a formal security policy model of a smart card operating system as an example.
Keywords
formal verification; security of data; common criteria version 3.1; formal methods; information technology security evaluation; security policy modeling; smart card operating system; Access control; Computer security; Guidelines; Information security; Laboratories; Mathematical model; Operating systems; Protection; Scanning probe microscopy; Smart cards; Common Criteria; Security Policy Model; Z Notation;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on
Conference_Location
Phoenix Park
ISSN
1738-9445
Print_ISBN
978-89-5519-138-7
Electronic_ISBN
1738-9445
Type
conf
Filename
4809919
Link To Document