The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2012 vol.10)
pp: 50-53
Jan Kallberg , University of Texas at Dallas
ABSTRACT
The Common Criteria for Information Technology Security Evaluation aims to become a global standard for IT security certification. However, it faces challenges owing to its rigid framework, rapid technology changes, and the increased militarization of cyberspace.
INDEX TERMS
Certification, Computer security, Cyberspace, Information technology, National security, Europe, Military communication, CCRA. computer security, Common Criteria, trust, nation, coalition, NATO, information security, conflict, war
CITATION
Jan Kallberg, "The Common Criteria Meets Realpolitik: Trust, Alliances, and Potential Betrayal", IEEE Security & Privacy, vol.10, no. 4, pp. 50-53, July-Aug. 2012, doi:10.1109/MSP.2012.29
REFERENCES
1. E.J. Powanda and J.W. Genovese, “Configuring a Trusted System Using the TNI,” Proc. 4th Aerospace Computer Security Applications Conf., IEEE, 1988, pp. 256–261.
2. J. Wood, “European Harmonised IT Security Evaluation Criteria,” Proc. 6th Int'l Conf. Application of Standards for Open Systems, ACM, 1990, pp. 138–143.
3. C. Jahl, “The Information Technology Security Evaluation Criteria,” Proc. 13th Int'l Conf. Software Eng., IEEE, 1991, pp. 306–312.
4. A. Hunstad, J. Hallberg, and R. Andersson, “Measuring IT Security—a Method Based on Common Criteria's Security Functional Requirements,” Proc. 5th Ann. IEEE Information Assurance Workshop, IEEE, 2004, pp. 226–233.
5. J. Hearn, “Does the Common Criteria Paradigm Have a Future?,” IEEE Security & Privacy, vol. 2, no. 1, 2004, pp. 64–65.
6. J. Hollander, “Prof. Kenneth N. Waltz's Political Realism Wins James Madison Lifetime Achievement Award in Political Science,” Columbia Univ. News,28 Mar. 2000; www.columbia.edu/cu/pr/00/03kennethWaltz.html .
7. M.V. Hayden, “The Future of Things Cyber,” Strategic Studies Q., vol. 5, no. 1, 2011.
8. E. Sterner, “Retaliatory Deterrence in Cyberspace,” Strategic Studies Q., vol. 5, no. 1, 2011.
9. J.S. Shapiro, “Understanding the Windows EAL4 Evaluation,” Computer, vol. 36, no. 2, 2003, pp. 103–105.
10. Communications Electronics Security Group, UK Government, 14 June 2012; www.cesg.gov.uk/Finda/PagesCCITSECSearch.aspx .
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool