Common Criteria

Results: 1278



#Item
641Crime prevention / Data security / Information technology management / Software development process / Capability Maturity Model / National Security Agency / Common Criteria / Information security / United States Agency for International Development / Security / Computer security / National security

U. S. Government Use of the Systems Security Engineering Capability Maturity Model (SSE-CMM) Panelists: Mr. James P. Craft, United States Agency for International Development Charles G. Menk III, National Security Agency

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
642Security / Ubiquitous computing / Computer security / Common Criteria / National Information Assurance Partnership / Computing / Protection Profile / Card reader / Identity document / ISO standards / Evaluation / Smart cards

USING THE COMMON CRITERIA IN SMART CARD SECURITY Title of Panel: Using the Common Criteria in Smart Card Security Panel Chair: Stuart W. Katzke, PhD Chief Scientist, Information Assurance Solutions Group National Securit

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
643Computer security / Electronic commerce / National security / Public key infrastructure / Protection Profile / Public key certificate / FIPS 140-2 / Common Criteria / Entrust / Cryptography / Public-key cryptography / Key management

PANEL SESSION: SECURITY REQUIREMENTS FOR PKIs Panel Chair: Panelists: Alfred W. Arsenault, Jr., NSA Marc LaRoche, Entrust

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
644Evaluation / Data security / National Information Assurance Partnership / Common Criteria / Capability Maturity Model / National Security Agency / Rainbow Series / Trusted Computer System Evaluation Criteria / Information security / Computer security / Security / Computing

The National Security Agency’s Use of the Systems Security Engineering Capability Maturity Model (SSE-CMM) Panel Chair: Ms. Mary D. Schanken National Security Agency 9800 Savage Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
645Software licenses / Protection Profile / Interoperability / Security Target / Proprietary software / Online shopping / Electronics / Knowledge / Multilevel security / Evaluation / Common Criteria / Computing

Thoughts and Questions on Common Criteria Evaluations Kenneth G. Olthoff National Security Agency

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
646Evaluation / Data security / Professional certification / Information security / Certification / Common Criteria / Cyber security standards / Standards / Computer security / Security

Certified vs Secure Chair Jon David Lehman Brothers Panelists Sarah Gordon IBM Tim Polk

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
647National Information Assurance Partnership / Test case / Knowledge / Test / Common Criteria Testing Laboratory / TPT / Software testing / Evaluation / Education

Reporting for NDPP Evaluations In an effort to standardize the information available to validators for NDPP evaluations to promote consistency in the review and performance of those evaluations, the following whitepaper

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2013-11-14 09:34:13
648Computing / Cryptographic software / Hardware security module / Smart cards / Ubiquitous computing / Java Card

Open Platform Development THE OPEN PLATFORM PROTECTION PROFILE (OP3) TAKING THE COMMON CRITERIA TO THE OUTER LIMITS

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
649Crime prevention / National security / Computer network security / Software testing / Vulnerability / Common Criteria / Information security / Social vulnerability / National Security Agency / Security / Computer security / Cyberwarfare

Databases of threats and countermeasures Jim Williams (Chair), The MITRE Corporation Natalie Brader, L-3 Network Security Douglas McGovern, Ray-McGovern Technical Consultants Kenneth Olthoff, NSA Adam Shostack, BindView

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
650Knowledge / Validation / Systems engineering process / Entropy / Security Target / Thought / Statistics / Common Criteria Evaluation and Validation Scheme / Evaluation / National Information Assurance Partnership / Common Criteria Testing Laboratory

Entropy Requirements in Network Device PP Evaluations NIAP recognizes the requirements for entropy in the Network Device PP (NDPP) pose challenges for the community as no existing standard incorporates the specific requi

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2013-03-27 14:45:04
UPDATE