ECMA/TR 64 : 1ED 93
Current
The latest, up-to-date edition.
SECURE INFORMATION PROCESSING VERSUS THE CONCEPT OF PRODUCT EVALUATION
12-01-2013
1 Scope
2 References
3 Acronyms and abbreviations
4 Introduction
5 Approaching Security: System perspective, Balance,
Feedback
5.1 System perspective
5.2 Balance
5.3 Feedback
6 Security Evaluations: the Practice
7 The Value of Formal Evaluations in the Commercial
Market
8 Conclusions
Annex A - The Concept of Security Evaluations - A
Tutorial
A.1 Introduction
A.2 Availability, Integrity, Confidentiality
A.3 Security Target
A.4 Protection Profile
A.5 Functional Criteria
A.6 Assurance Criteria
A.7 Predefined Functionality Classes
A.8 The Evolution of Security Evaluation Criteria
A.9 Evaluation and Certification
A.10 Harmonization of Criteria
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.