DocumentCode :
491933
Title :
Security Policy Modeling using Z notation for Common Criteria version 3.1
Author :
Park, Junkil ; Choi, Jin-Young
Author_Institution :
Theor. & Formal Methods Lab.
Volume :
01
fYear :
2009
fDate :
15-18 Feb. 2009
Firstpage :
137
Lastpage :
142
Abstract :
The common criteria for information technology security evaluation (CC) is an international standard for evaluating secure computer systems. To obtain high evaluation assurance level, CC requires formalism in the development class. In the security policy modeling of CC v3.1, the use of formal methods is mandatory. This paper gives a guideline for developing formal security policy model with Z notation in CC v3.1. We compare CC v3.1 to CC v2.3 with respect to security policy model. We explain a structure of formal security policy model written in Z, and provide a formal security policy model of a smart card operating system as an example.
Keywords :
formal verification; security of data; common criteria version 3.1; formal methods; information technology security evaluation; security policy modeling; smart card operating system; Access control; Computer security; Guidelines; Information security; Laboratories; Mathematical model; Operating systems; Protection; Scanning probe microscopy; Smart cards; Common Criteria; Security Policy Model; Z Notation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on
Conference_Location :
Phoenix Park
ISSN :
1738-9445
Print_ISBN :
978-89-5519-138-7
Electronic_ISBN :
1738-9445
Type :
conf
Filename :
4809919
Link To Document :
بازگشت