Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2016, Vol. 56 Issue (5) : 493-498     DOI: 10.16511/j.cnki.qhdxxb.2016.25.006
INFORMATION SECURITY |
Analyse of the security architecture and policy model in the Common Criteria
SHI Hongsong, GAO Jinping, JIA Wei, LIU Hui
China Information Technology Security Evaluation Center, Beijing 100085, China
Download: PDF(1113 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  The Common Criteria (CC) does not adequately explain the security architecture and policy model requirements which hinders security evaluations. This paper classifies the requirements through a general CC evaluation model based on design decomposition. The analysis then categorizes the TOE security functionality (TSF) as the TSF meta-functionality and the TSF obligatory functionality to demonstrate the need for justifying the security properties in the architecture design. Then, security architecture description and evaluation approaches are described for vulnerability analysis activity. Then, this paper describes the need for formalizing the security policy model based on observations of the logical gap between the security target (ST) and the functional specification (FSP) requirements. A (semi-) formalization of the security functional requirements is given to bridge the gap. The national standard GB/T18336 (the Chinese version of CC v3.1) will be adopted soon in China, so the analysis in this paper is needed to improve security evaluation activities.
Keywords Common Criteria      security architecture      TSF meta- functionality      TSF obligatory functionality      security policy model     
ZTFLH:  TP309.2  
Issue Date: 15 May 2016
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
SHI Hongsong
GAO Jinping
JIA Wei
LIU Hui
Cite this article:   
SHI Hongsong,GAO Jinping,JIA Wei, et al. Analyse of the security architecture and policy model in the Common Criteria[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(5): 493-498.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2016.25.006     OR     http://jst.tsinghuajournals.com/EN/Y2016/V56/I5/493
   
   
   
   
[1] Bañón M. Security evaluation, testing and specification[C]//SC27 Security Techniques of 25 Years of Information Security Standardization (1990-2015). Ipswich, UK:Gipping Press, 2015:124-130.
[2] ISO/IEC 15408. Information Technology-Security Techniques-Evaluation Criteria for IT Security[S]. Switzerland:ISO/IEC, 2009.
[3] GB/T 18336. 信息技术安全技术信息技术安全评估准则[S]. 北京:中国国家标准化管理委员会, 2005. GB/T 18336. Information Technology-Security Techniques-Evaluation Criteria for IT Security[S]. Beijing:Standardization Administration of the People's Republic of China, 2005. (in Chinese)
[4] CCRA Management Committee. CCRA:Arrangement on the recognition of Common Criteria certificates in the field of information technology security[Z/OL].[2015-06-03] . http://www.commoncriteriaportal.org/ccra/.
[5] CC Supporting Document. Composite product evaluation for smartcards and similar devices, version 1.2[Z/OL].[2015-06-03] . http://www.commoncriteriaportal.org/cc/.
[6] 毕海英, 石竑松, 高金萍, 等. 通用评估准则的发展与应用现状[J]. 信息技术与标准化, 2013,347(11):14-17. BI Haiying, SHI Hongsong, GAO Jinping, et al. The development of Common Criteria and its applications[J].Information Technology & Standardization, 2013,347(11):14-17. (in Chinese)
[7] CC Supporting Document. Security architecture requirements (ADV_ARC) for smart cards and similar devices, version 2.0[Z/OL].[2015-06-03] . http://www.commoncriteriaportal.org/cc/.
[8] Bundesam FVr Sicherheit der Informationstechnik (BSI). Guideline for the development and evaluation of formal security policy models in the scope of ITSEC and Common Criteria, version 2.0[Z/OL].[2015-06-03] . http://www.bsi.bund.de/cae/servlet/contentblob/478122/publicationFile/30243/Guideline_FMSP_v20_pdf.pdf.
[9] Chetali B, Nguyen Q H. Industrial use of formal methods for a high-level security evaluation[C]//FM 2008:Formal Methods. Berlin, Germany:Springer Berlin Heidelberg, 2008:198-213.
[10] Narasamdya I, Perin M. Certification of smart-card applications in Common Criteria[C]//Proceedings of the 2009 ACM Symposium on Applied Computing. Berlin, Germany:Springer Berlin Heidelberg, 2009:309-324.
[11] Beckert B. Mind the gap:Formal verification and the Common Criteria[C]//In 6th International Verification Workshop (VERIFY-2010). Edinburgh, UK:IJCAR, 2010:4-12.
[1] WANG Lina, ZHOU Weikang, LIU Weijie, YU Rongwei. Hardware-assisted ROP attack detection on cloud platforms[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(3): 237-242.
[2] ZHAO Gang, YU Yue, HUANG Minhuan, WANG Yuying, WANG Jiajie, SUN Xiaoxia. Test method for the font parser in PDF viewers[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(3): 266-271.
[3] CAO Laicheng, LIU Yufei, DONG Xiaoye, GUO Xian. User privacy-preserving cloud storage scheme on CP-ABE[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(2): 150-156.
[4] ZOU Jing, LI Bin, ZHANG Li, LUO Yang, SUN Yunchuan, LI Shixian. Security analysis of dynamic provable data possession based on Hash aggregation[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(11): 1145-1149,1158.
[5] WANG Yuding, YANG Jiahai. Data access control model based on data's role and attributes for cloud computing[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(11): 1150-1158.
[6] SHEN Ke, YE Xiaojun, LIU Xiaonan, LI Bin. Android App behavior-intent inference based on API usage analysis[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(11): 1139-1144.
[7] LIANG Bin, GONG Weigang, YOU Wei, LI Zan, SHI Wenchang. DTA technique for JavaScript optimizing compilation mode[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(9): 932-938.
[8] PEI Jisheng, YE Xiaojun. Provenance dependency path pattern mining algorithm based on grammar induction[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(6): 561-568.
[9] FANG Yong, LIU Daosheng, HUANG Cheng. Detecting of fake accounts with hierarchical clustering[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(6): 620-624.
[10] ZHOU Caiqiu, YANG Yuwang, WANG Yongjian. Behavior measurement scheme for the wireless sensor network nodes[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(1): 39-43.
[11] NING Bo, PEI Xiaoxia, LI Yuju, PEI Xinyu. Query authentications based on a fixed grid partitioning quad-tree index in LBS big data[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(7): 785-792.
[12] LI Zhoujun, WU Chunming, WANG Xiao. Assessment of Android application's risk behavior based on a sandbox system[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(5): 453-460.
[13] MA Gang, DU Yuge, YANG Xi, ZHANG Bo, SHI Zhongzhi. Risk assessment expert system for the complex system[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(1): 66-76,82.
[14] XU Qiang, LIANG Bin, YOU Wei, SHI Wenchang. Detecting Android malware phishing login interface based on SURF algorithm[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(1): 77-82.
[15] TU Shanshan, TAO Huaizhou, HUANG Yongfeng. Detection of instant voice communication steganography using semi-supervised learning[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(11): 1246-1252.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd