CS 526 Information Security : Assignment 7

نویسنده

  • John Ross Wallrabenstein
چکیده

We begin by addressing methods for evaluating Xinu with respect to the User Data Protection requirements of the Common Criteria documents. Secondly, we address the constraints necessary to secure an EAL6 certification. We are given that the Xinu operating system has already satisfied the requirements for an EAL5 approval, we only address the additional constraints that must be satisfied to obtain a rating of EAL6. In the interest of brevity, we only list the major section heading, rather than the specific requirements we address (e.g. ADV IMP.2 rather than ADV IMP.2.Xi). It is trivial to take the set difference between the EAL5 and EAL6 requirements. We focus on discussing the specific tools, methods and approaches an evaluator would take to certify Xinu at the EAL6 level. For clarity, our crucial points are emphasized, uld or printed in bold face.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pharmacological profile of novel acid pump antagonist 7-(4-fluorobenzyloxy)-2,3-dimethyl-1-{[(1S,2S)-2-methyl cyclopropyl]methyl}-1H-pyrrolo[2,3-d]pyridazine (CS-526).

The pharmacological profiles of the novel acid pump antagonist 7-(4-fluorobenzyloxy)-2,3-dimethyl-1-{[(1S,2S)-2-methylcyclopropyl]methyl}-1H-pyrrolo[2,3-d]pyridazine (CS-526) were investigated in terms of hog gastric H+,K+-ATPase activity, gastric acid secretion, and acute gastroesophageal lesions in comparison with other proton pump inhibitors (PPIs). CS-526 inhibited H+,K+-ATPase activity in ...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance

Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness of ALOHA Protocol. In this paper, a time-saving Aloha protocol with slotted carrier sense proposed which we c...

متن کامل

CS 526 Information Security : Assignment 5

Before we address the question of which properties the proposed signature schemes lack, we enumerate desirable properties of any digital signature system: 1. Authenticity: A digital signature should be authentic, in that the signature will convince the recipient that the claimed author deliberately signed the document. It should be computationally infeasible for a third party to forge the autho...

متن کامل

Efficient Key Assignment for Hierarchical Access Control using One-way Hash Function

An efficient hierarchical key assignment scheme for access control based on one-way hash function is proposed, which allows the user in a security class to derive the keys of its subordinating classes, so that the superior class can access the information encrypted and owned by its subordinating classes. This scheme is also flexible to change the hierarchical relationship among security classes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010