About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE

Research Article

Interpretation of Policy Oriented Common Criteria Components for Network Computing Environment

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/COMSWA.2008.4554401,
        author={Manpreet Singh and Manjeet Singh Patterh},
        title={Interpretation of Policy Oriented Common Criteria Components for Network Computing Environment},
        proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2008},
        month={6},
        keywords={Security Policy Security Model Access Control Information Flow Control Network Security Policy.},
        doi={10.1109/COMSWA.2008.4554401}
    }
    
  • Manpreet Singh
    Manjeet Singh Patterh
    Year: 2008
    Interpretation of Policy Oriented Common Criteria Components for Network Computing Environment
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2008.4554401
Manpreet Singh1,*, Manjeet Singh Patterh1,*
  • 1: UCOE,Punjabi University INDIA
*Contact email: emailchd@gmail.com, mspattar@gmail.com

Abstract

The aim of the paper is to design a reliable policy oriented security functional framework for network computing environment. Generally it is difficult to define reliable security policy components that should be applied to validate secure network computing environment. Therefore, we have decided to prepare the interpretation of security functional requirements that are defined in the ISO/IEC 15408 common criteria. In the verification process, the derived policy components are related to the specific security objectives of the network communication environment. The evidences listed in the case study supports the claims that the proposed network security policy interpretation framework is a complete and cohesive set of requirements.

Keywords
Security Policy Security Model Access Control Information Flow Control Network Security Policy.
Published
2008-06-27
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.1109/COMSWA.2008.4554401
Copyright © 2008–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL