About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

CC-based Design of Secure Application Systems

By Sharp, Robin1,2

From

System Security, Department of Informatics and Mathematical Modeling, Technical University of Denmark1

Department of Informatics and Mathematical Modeling, Technical University of Denmark2

This paper describes some experiences with using the Common Criteria for Information Security Evaluation as the basis for a design methodology for secure application systems. The examples considered include a Point-of-Sale (POS) system, a wind turbine park monitoring and control system and a secure workflow system, all of them specified to achieve CC assurance level EAL3.

The methodology is described and strengths and weaknesses of using the Common Criteria in this way are discussed. In general, the systematic methodology was found to be a good support for the designers, enabling them to produce an effective and secure design, starting with the formulation of a Protection Profile and ending with a concrete design, within the project timeframe.

Language: English
Publisher: Springer
Year: 2009
Pages: 111-121
Proceedings: International Symposium on Engineering Secure Software and Systems
Series: Lecture Notes in Computer Science
ISBN: 364200198X , 364200198x , 3642001998 , 9783642001987 and 9783642001994
ISSN: 03029743
Types: Conference paper
DOI: 10.1007/978-3-642-00199-4_10
ORCIDs: Sharp, Robin

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis