Selected Papers in Security Studies: Volume 9 Common Criteria Meets Realpolitik Trust, Alliances, and Potential Betrayal
نویسنده
چکیده
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As Common Criteria is formulated today it is unlikely that it would survive over time. The reasons why it might fail are the rigid framework, rapid technical development makes a security target a moving target leading to instability and uncertainty, and the increased militarization in cyberspace moving from information assurance to information operations.
منابع مشابه
What Is Resilience and How Can It Be Nurtured? A Systematic Review of Empirical Literature on Organizational Resilience
Background Recent health system shocks such as the Ebola outbreak of 2014–2016 and the global financial crisis of 2008 have generated global health interest in the concept of resilience. The concept is however not new, and has been applied to other sectors for a longer period of time. We conducted a review of empirical literature from both the health and other sectors to synthesize evidence on ...
متن کاملPseudonymity in the Light of Evidence-Based Trust
This position paper discusses the relation of privacy, namely pseudonymity, to evidence-based trust (or rather reputation). Critical concepts of evidence-based trust/reputation systems are outlined first, followed by an introduction to the four families of the Common Criteria (for security evaluation) Privacy Class: Unobservability, Anonymity, Unlinkability, and Pseudonymity. The paper then dis...
متن کاملLinguistic Harbingers of Betrayal: A Case Study on an Online Strategy Game
Interpersonal relations are fickle, with close friendships often dissolving into enmity. In this work, we explore linguistic cues that presage such transitions by studying dyadic interactions in an online strategy game where players form alliances and break those alliances through betrayal. We characterize friendships that are unlikely to last and examine temporal patterns that foretell betraya...
متن کاملFirst Trimester Potential Biochemical Predictive Tests for Gestational Diabetes Mellitus: A Systematic Review
Objective: Gestational diabetes mellitus (GDM) is the most common metabolic complication during pregnancy. So, a large number of studies have evaluated the usefulness of different screening tests. The aim of this study was focused on the potential of only first-trimester screening used in the prediction of GDM. Materials and Methods: In this systematic review, we searched PubMed, EMBASE, and S...
متن کاملA Sociological Study on Social Trust of Social Security Organization’s Insured Population (Case Study: West Tehran Social Security Branches)
Social trust is one of the foundations for social order in society. Trust in any organization is affected by various factors such as customer satisfaction, service quality, staff skill and taking into account the customer orientation and service receivers’ satisfaction principles. This research seeks to study the sociological study of social trust of the insured population of social security or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012