Author:
Ekclhart Andreas,Fenz Stefan,Goluch Gernot,Weippl Edgar
Reference19 articles.
1. CC, “Common criteria for information technology security evaluation, part 1: Introduction and general model, version 2.3,” 2005.
2. V. Raskin, C. F. Hempelmann, K. E. Triezenberg, and S. Nirenburg, “Ontology in information security: a useful theoretical foundation and methodological tool.” in In Proceedings of the 2001 Workshop on New Security Paradigms, NSPW’ 01, ACM Press, New York, 2001.
3. K. Olthoff, “A cursory examination of market forces driving the use of protection profiles.” in In Proceedings of the 1999 Workshop on New Security Paradigms, NSPW’ 99, ACM Press, 2000.
4. J. Hearn, “Does the common criteria paradigm have a future?” Security & Privacy Magazine, IEEE, vol. 2, p. 6465, 2004.
5. S. Katzke, “The common criteria years (19931998): Looking back and ahead.” Presentation, 4th International Common Criteria Conference, 2003.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Metamodel for Web Application Security Evaluation;2023 34th Conference of Open Innovations Association (FRUCT);2023-11-15
2. SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation;Computer Security. ESORICS 2022 International Workshops;2023
3. A survey on common criteria (CC) evaluating schemes for security assessment of IT products;PeerJ Computer Science;2021-10-26
4. Common Criteria Vulnerability Assessment Ontology;Theory and Applications of Dependable Computer Systems;2020
5. Ontology-Based Model for Automotive Security Verification and Validation;Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services;2019-12-02