Common Criteria

Results: 1278



#Item
31Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-07-08 14:07:07
32ISO standards / Common Criteria / Security Target / Evaluation / Audit / Computing / Knowledge

Microsoft PowerPoint - 3. CC-KM-LabEmpanelment Process.pptx

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2014-11-20 05:25:24
33Computer security / Computing / Data security / Cryptography / Crime prevention / Tests / Common Criteria / Protection Profile / Security Target / Evaluation / Information security / Evaluation Assurance Level

Microsoft Word - CCBusinessUsersSeminarOutline.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:45
34Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
35Computer security / Computing / Security / Security Target / Common Criteria / Evaluation Assurance Level / Ohta / Protection Profile / Voice over IP

OPERATOR TERMINAL ADAPTER SECURITY TARGET Edition: June-10 Previous editions:

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:37
36Security / Computer security / Prevention / Cryptography / ISO standards / Common Criteria / USB / Password / Key management / Key / Security token / BitLocker

Collaborative Protection Profile for USB Portable Storage Devices collaborative Protection Profile for USB Portable Devices Version 0.3

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-08-12 12:03:00
37Business / Evaluation / Computer security / ISO standards / Standards organizations / Common Criteria / Quality management / Security Target / ISO/IEC JTC 1 / Quality management system / ISO/IEC 17025 / Requirement

Microsoft PowerPoint - 4. CC-SKN-CCTL-LabRequirement.pptx

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2014-11-20 05:26:02
38Computer security / Data security / Security / Prevention / Computer network security

Criteria Common to All [Security, Availability, Processing Integrity, and Confidentiality] Principles CC1.0 CC2.0

Add to Reading List

Source URL: www.aicpa.org

Language: English
39Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
40Security / Prevention / Computer security / Identification / Cryptography / Crime prevention / Information governance / National security / Common Criteria / Biometrics / Protection Profile / Fingerprint

Biometric Spoof Detection in the Context of Common Criteria Frank Grefrath, German Federal Office for Information Security Nils Tekampe, TÜV Informationstechnik GmbH 11. ICCC, September 2010, Turkey

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-08-25 09:46:40
UPDATE