Threat description for the PP by using the concept of the assets protected by TOE
ICCS'03 Proceedings of the 2003 international conference on Computational science
Protection Profile for Connected Interoperable DRM Framework
Information Security Applications
Protection profile for data leakage protection system
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Information technology security evaluation using CERT c secure coding standard
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Hi-index | 0.00 |
A PP defines an implementation-independent set of IT security requirements for a category of TOEs. Consumers can therefore construct or cite a PP to express their IT security needs without reference to any specific TOE. Generally, PPs contain security assurance requirements about the security of development environment for IT product or system and they are described in ALC_DVS (Development Security) family in the part 3 of the Common Criteria (CC). This paper proposes some security environments for development site by analyzing the compliance between ALC_DVS.1 of the CC and Base Practices (BPs) of the Systems Security Engineering Capability Maturity.