期刊文献+

信息安全评估标准研究 被引量:14

Search of Security Evaluation Criteria
下载PDF
导出
摘要 信息安全评估标准是对信息安全产品或系统进行安全水平测定、评估的一类标准.文中以时间为线索,根据安全评估标准的特点,提出了奠基时期、混沌时期、合并时期和统一时期的阶段划分方法,比较系统地对信息安全标准的形成和发展过程进行全面的分析,给出了信息安全评估标准演化进程的一个全景视图.然后介绍了与各个阶段对应的、典型的信息安全评估标准:TCSEC、ITCSEC和CC(ISO15408),着重讨论了这些标准的特点及应用方式,并进行比较分析,最后总结了当前安全评估标准中亟待解决的问题. Information Security Evaluation Criteria (ISEC) is those kinds criteria which can mensurate and evaluate information security products or systems. According the character of ISEC, clued by time, a classification method that divided the progress course of ISEC into foundation period, chaos period, combination period and unification period was proposed at the first time, the originating and developing procedure of ISEC was analyzed systematically, and a comprehensive perspective of the evolution process of ISEC is presented. Then the period-corresponding, typical criteria: ICSEC, ITCSEC and CC (ISO15408) are introduced, the characters and application models were discussed, and compared each other. Finally, some urgent problems about ISEC were coneluded.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第4期634-637,共4页 Journal of Chinese Computer Systems
基金 国家"八六三"宽带VPN项目(863-104-03-01)资助 2003年度四川省科技攻关项目(03GG007-007)资助
关键词 安全评估 安全评估标准TCSEC ITSEC CC HSO/IEC 15408 security evaluation security evaluation criteria TCSEC ITSEC CC ISO/IEC 15408
  • 相关文献

参考文献19

  • 1Charles P Pfleeger.Security in computing(second edition)[M].Prentice Hall PTR,1997. 被引量:1
  • 2Richard E Smith.Trends in government endorse security product evaluations[C].23rd National Information Systems Security Conference,Baltimore,Maryland,USA,Oct16-19,2000. 被引量:1
  • 3The National Information Assurance Partnership.Common criteria NIAP validated products list[S].http://niap.nist.gov/cc-scheme/ValidatedProducts.html,Mar2001. 被引量:1
  • 4Clark Weissman.Security controls in the ADEPT-50 time sharing system[C].In:Proceedings of the 1069 AFIPS Fall Joint Computer Conference,AFIPS Press,1969,119-133. 被引量:1
  • 5Butler W Lampson.Dynamic protection structures[C].In:Proceedings of the AFIPS Fall Joint Computer Conference,volume 35,Las Vegas,Nevada,Nov 1969,27-38. 被引量:1
  • 6Willis H Ware.Security controls for computer systems(U):report of defense science board task force on computer security[R].Technical Report,the Rand Corporation,Santa Monica,CA,published for the Office of the Director of Defense Research and Engineering,Washington,DC,Feb 1970. 被引量:1
  • 7James P Anderson.Computer security technology planning study[Z].Volume II.ESD-TR-73-51,Electronic Systems Division,Air Force Systems Command,Hanscom. 被引量:1
  • 8Bell D E,Lapadula L J.Secure computer systems:unified exposition and multics interpretation[Z].MITRE Corp,1976,MTR-2997-3130. 被引量:1
  • 9US DoD 5200.28-STD,Trusted computer systems evaluation criteria[S].1985. 被引量:1
  • 10German Information Security Agency.IT-security criteria:criteria for the evaluation of trustworthiness of IT systems(first version)[S].1988. 被引量:1

二级参考文献1

  • 1中国信息安全产品测评认证中心.国家标准GB/T 18336-2001介绍.http:∥www.itsec.gov.cn.,. 被引量:1

共引文献20

同被引文献90

引证文献14

二级引证文献68

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部