Selected Papers in Security Studies: Volume 9 Common Criteria Meets Realpolitik Trust, Alliances, and Potential Betrayal

نویسنده

  • Jan Kallberg
چکیده

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As Common Criteria is formulated today it is unlikely that it would survive over time. The reasons why it might fail are the rigid framework, rapid technical development makes a security target a moving target leading to instability and uncertainty, and the increased militarization in cyberspace moving from information assurance to information operations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

What Is Resilience and How Can It Be Nurtured? A Systematic Review of Empirical Literature on Organizational Resilience

Background Recent health system shocks such as the Ebola outbreak of 2014–2016 and the global financial crisis of 2008 have generated global health interest in the concept of resilience. The concept is however not new, and has been applied to other sectors for a longer period of time. We conducted a review of empirical literature from both the health and other sectors to synthesize evidence on ...

متن کامل

Pseudonymity in the Light of Evidence-Based Trust

This position paper discusses the relation of privacy, namely pseudonymity, to evidence-based trust (or rather reputation). Critical concepts of evidence-based trust/reputation systems are outlined first, followed by an introduction to the four families of the Common Criteria (for security evaluation) Privacy Class: Unobservability, Anonymity, Unlinkability, and Pseudonymity. The paper then dis...

متن کامل

Linguistic Harbingers of Betrayal: A Case Study on an Online Strategy Game

Interpersonal relations are fickle, with close friendships often dissolving into enmity. In this work, we explore linguistic cues that presage such transitions by studying dyadic interactions in an online strategy game where players form alliances and break those alliances through betrayal. We characterize friendships that are unlikely to last and examine temporal patterns that foretell betraya...

متن کامل

First Trimester Potential Biochemical Predictive Tests for Gestational Diabetes Mellitus: A Systematic Review

Objective: Gestational diabetes mellitus (GDM) is the most common metabolic complication during pregnancy. So, a large number of studies have evaluated the usefulness of different screening tests. The aim of this study was focused on the potential of only first-trimester screening used in the prediction of GDM. Materials and Methods: In this systematic review, we searched PubMed, EMBASE, and S...

متن کامل

A Sociological Study on Social Trust of Social Security Organization’s Insured Population (Case Study: West Tehran Social Security Branches)

Social trust is one of the foundations for social order in society. Trust in any organization is affected by various factors such as customer satisfaction, service quality, staff skill and taking into account the customer orientation and service receivers’ satisfaction principles. This research seeks to study the sociological study of social trust of the insured population of social security or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012