CS 526 Information Security : Assignment 7
نویسنده
چکیده
We begin by addressing methods for evaluating Xinu with respect to the User Data Protection requirements of the Common Criteria documents. Secondly, we address the constraints necessary to secure an EAL6 certification. We are given that the Xinu operating system has already satisfied the requirements for an EAL5 approval, we only address the additional constraints that must be satisfied to obtain a rating of EAL6. In the interest of brevity, we only list the major section heading, rather than the specific requirements we address (e.g. ADV IMP.2 rather than ADV IMP.2.Xi). It is trivial to take the set difference between the EAL5 and EAL6 requirements. We focus on discussing the specific tools, methods and approaches an evaluator would take to certify Xinu at the EAL6 level. For clarity, our crucial points are emphasized, uld or printed in bold face.
منابع مشابه
Pharmacological profile of novel acid pump antagonist 7-(4-fluorobenzyloxy)-2,3-dimethyl-1-{[(1S,2S)-2-methyl cyclopropyl]methyl}-1H-pyrrolo[2,3-d]pyridazine (CS-526).
The pharmacological profiles of the novel acid pump antagonist 7-(4-fluorobenzyloxy)-2,3-dimethyl-1-{[(1S,2S)-2-methylcyclopropyl]methyl}-1H-pyrrolo[2,3-d]pyridazine (CS-526) were investigated in terms of hog gastric H+,K+-ATPase activity, gastric acid secretion, and acute gastroesophageal lesions in comparison with other proton pump inhibitors (PPIs). CS-526 inhibited H+,K+-ATPase activity in ...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملProposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance
Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness of ALOHA Protocol. In this paper, a time-saving Aloha protocol with slotted carrier sense proposed which we c...
متن کاملCS 526 Information Security : Assignment 5
Before we address the question of which properties the proposed signature schemes lack, we enumerate desirable properties of any digital signature system: 1. Authenticity: A digital signature should be authentic, in that the signature will convince the recipient that the claimed author deliberately signed the document. It should be computationally infeasible for a third party to forge the autho...
متن کاملEfficient Key Assignment for Hierarchical Access Control using One-way Hash Function
An efficient hierarchical key assignment scheme for access control based on one-way hash function is proposed, which allows the user in a security class to derive the keys of its subordinating classes, so that the superior class can access the information encrypted and owned by its subordinating classes. This scheme is also flexible to change the hierarchical relationship among security classes...
متن کامل