The formal analysis of CC security functional components
This document contain a formal analysis of the CC security functional components to evaluate the 搒pecialization level?of the components and a few interpretations derived from the results of the analysis.
Saved in:
Main Authors: | HUANG Yuan-fei1, HE De-quan2, CHEN Ming-qi1 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2003-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74362204/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach
by: Frank Moses, et al.
Published: (2023-12-01) -
Design and implementation of national security vulnerability database
by: ZHANG Yu-qing1, et al.
Published: (2011-01-01) -
Legal aspects of functional security standardisation of the Internet of Things
by: P. S. Klimushyn, et al.
Published: (2023-09-01) -
Research of Mobile Internet Core Security Requirement and Protection
by: Fangheng Xu, et al.
Published: (2013-11-01) -
Research on formal security policy model specification and its formal analysis
by: LI Li-ping1, et al.
Published: (2006-01-01)