Common Criteria Security Target for VoiceIdent Unit 2.0

ثبت نشده
چکیده

• EW02: Update the " nuance " versions, ASR (Automatic Speech Recognition) and SV (Speech Verification) For VoiceIdent Unit 1.0 it was agreed upon the following arrangement: All text, which is taken from the PP, is in blue colour. New text specific to this ST is in black colour and additionally in Italics. For VoiceIdent Unit 2.0 only the extensions between the versions are highlighted. The following subchapters will provide some information for the further understanding of this document and introduce the reader to some used conventions: The author would like to acknowledge the significant contributions of four draft Protection Profiles for biometric systems [PP_UK_BD], [PP_US_BV_BR], [PP_US_BV_MR], and [PP_US_BS] as well as of the Biometric Evaluation Methodology Supplement [BEM] of the Common Criteria Biometric Evaluation Methodology Working Group. Due to its overall relevance, much of their work has been incorporated into this document. Application notes are provided where they may contribute to the understanding of the reader. These notes, while not part of the formal statement of the Security Target, are included as an acknowledgment of the diverse backgrounds of potential users of this Security Target. It should be understood, that these application notes cannot completely substitute an understanding of the biometric techniques or related [CC] documents. Application notes are divided into: • General Application Note (GEN)-explains basic principles of the approach and provides general information.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Selected Papers in Security Studies: Volume 9 Common Criteria Meets Realpolitik Trust, Alliances, and Potential Betrayal

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common C...

متن کامل

Compliance of POLYAS with the Common Criteria Protection Profile - A 2010 Outlook on Certified Remote Electronic Voting

In 2008, the German Federal Office for Information Security issued the common criteria protection profile for Online Voting Products (PP-0037). Accordingly, we evaluated the Polyas electronic voting system, which is used for legally binding elections in several international organizations (German Gesellschaft for Informatik, GI, among others), for compliance with the common criteria protection ...

متن کامل

Compliance of POLYAS with the Common Criteria Protection Profile

In 2008, the German Federal Office for Information Security issued the common criteria protection profile for Online Voting Products (PP-0037). Accordingly, we evaluated the Polyas electronic voting system, which is used for legally binding elections in several international organizations (German Gesellschaft for Informatik, GI, among others), for compliance with the common criteria protection ...

متن کامل

White Paper: Infineon Trusted Platform Module Security Conformance

To insure that a Trusted Platform Module (TPM) has been manufactured according to high security standards, Trusted Computing Group (TCG) specifications are accomplished by conformance tests. Conformance describes the correct and secure implementation of a TPM according to the specification and the respective protection profile. Conformance with a protection profile and security target, which bo...

متن کامل

Intelligent Sensors Security

The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IE...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008