Application and Development of Protection Profile using SSE-CMM
碩士 === 元智大學 === 資訊工程學系 === 94 === The Common Criteria (CC) is the newest and strictest security system evaluation criteria. The CC provides consumers, developers, and evaluators a good product and system standard. The Protection Profile (PP) [2-22] in Common Criteria is implementation independent st...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/90520749457592116234 |
id |
ndltd-TW-094YZU05392023 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094YZU053920232016-06-01T04:15:08Z http://ndltd.ncl.edu.tw/handle/90520749457592116234 Application and Development of Protection Profile using SSE-CMM 以SSE-CMM產生保護剖繪的技術及應用 Sheng-Yu Liang 梁聖瑜 碩士 元智大學 資訊工程學系 94 The Common Criteria (CC) is the newest and strictest security system evaluation criteria. The CC provides consumers, developers, and evaluators a good product and system standard. The Protection Profile (PP) [2-22] in Common Criteria is implementation independent statements of security requirements that are shown to address threats existing in a specified environment. Although CC is a standard to evaluate information security system, it does not provide an objective and systematic development process of PP. The development of a PP based on the CC requires difficult engineering decisions, complex analyses, and detailed knowledge of the intended environment and system usage. In order to overcome the disadvantages, this thesis applies a process reference model–Systems Security Engineering Capability Maturity Model (SSE-CMM) to developing a PP. SSE-CMM focuses on the requirements for implementing security in an IT system or series of related systems. SSE-CMM can be referenced to identify a desired process to assist development a Protection Profile. Using SSE-CMM greatly increases the likelihood of producing a high quality Protection Profile. Besides, we use UML Diagrams to enhance visualization and to facilitate vulnerability analysis and we proposed using HAZOP to assess the found threats. This thesis provides a visual, systematic, and objective development process of PP. This thesis generates a Personnel Access Control System PP by the method we proposed and proposes visual and formal methods to evaluate systems or products with our PP. Besides, we evaluate our PP in order to prove that our method is efficacious and systematic. 范金鳳 2006 學位論文 ; thesis 116 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 元智大學 === 資訊工程學系 === 94 === The Common Criteria (CC) is the newest and strictest security system evaluation criteria. The CC provides consumers, developers, and evaluators a good product and system standard. The Protection Profile (PP) [2-22] in Common Criteria is implementation independent statements of security requirements that are shown to address threats existing in a specified environment. Although CC is a standard to evaluate information security system, it does not provide an objective and systematic development process of PP. The development of a PP based on the CC requires difficult engineering decisions, complex analyses, and detailed knowledge of the intended environment and system usage. In order to overcome the disadvantages, this thesis applies a process reference model–Systems Security Engineering Capability Maturity Model (SSE-CMM) to developing a PP. SSE-CMM focuses on the requirements for implementing security in an IT system or series of related systems. SSE-CMM can be referenced to identify a desired process to assist development a Protection Profile. Using SSE-CMM greatly increases the likelihood of producing a high quality Protection Profile. Besides, we use UML Diagrams to enhance visualization and to facilitate vulnerability analysis and we proposed using HAZOP to assess the found threats. This thesis provides a visual, systematic, and objective development process of PP.
This thesis generates a Personnel Access Control System PP by the method we proposed and proposes visual and formal methods to evaluate systems or products with our PP. Besides, we evaluate our PP in order to prove that our method is efficacious and systematic.
|
author2 |
范金鳳 |
author_facet |
范金鳳 Sheng-Yu Liang 梁聖瑜 |
author |
Sheng-Yu Liang 梁聖瑜 |
spellingShingle |
Sheng-Yu Liang 梁聖瑜 Application and Development of Protection Profile using SSE-CMM |
author_sort |
Sheng-Yu Liang |
title |
Application and Development of Protection Profile using SSE-CMM |
title_short |
Application and Development of Protection Profile using SSE-CMM |
title_full |
Application and Development of Protection Profile using SSE-CMM |
title_fullStr |
Application and Development of Protection Profile using SSE-CMM |
title_full_unstemmed |
Application and Development of Protection Profile using SSE-CMM |
title_sort |
application and development of protection profile using sse-cmm |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/90520749457592116234 |
work_keys_str_mv |
AT shengyuliang applicationanddevelopmentofprotectionprofileusingssecmm AT liángshèngyú applicationanddevelopmentofprotectionprofileusingssecmm AT shengyuliang yǐssecmmchǎnshēngbǎohùpōuhuìdejìshùjíyīngyòng AT liángshèngyú yǐssecmmchǎnshēngbǎohùpōuhuìdejìshùjíyīngyòng |
_version_ |
1718288162340470784 |