Font Size: a A A

Research Of Evaluation Method Of The Security Isolation And Information Exchange Equipment Based On CC

Posted on:2007-05-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y CengFull Text:PDF
GTID:2178360185965990Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of e-Commerce and e-Government, the Security Isolation becomes a substitute of Network Isolation Technology in some low security or field not high of sensitive intensity because of its Information Exchange Technology, which can meet the request of applications of e-Commerce and e-Government. This paper is concerned about the principle and realization technology of the Security Isolation and Information Exchange Equipment, and discusses some popular Security Isolation and Information Exchange Equipments in the internal market.This paper discusses the development of the method of test and evaluation in IT security products around the world, basing on the analyzing of the Model and framework of the Common Criteria and Protect Profile theory, and also brings out the Summarization, the Security Environment, the Security Objectives, the IT Security Requirements and the Rationale of the Security Isolation and Information Exchange Equipment, which constitute the primary contents of the Protect Profile.This paper also researchs the history of the Software Testing Technology and the application of testing methods in the PP evaluation. People usually use the Black-Box Method in the PP evaluation; somewhere use the Grey-Box Method. This paper compares the methods of constructing test script including the Divide-Equivalent Method, the Borderline-Value Analyzing Method and the Error-Deduce Method, and then, shows the usage of these methods in the PP evaluation activities with evaluating two security functional requirements: Audit Data Generation and Selective Audit Review.
Keywords/Search Tags:Security Isolation, Information Exchange, Common Criteria(CC), Protect Profile(PP), Method of Test and Evaluation
PDF Full Text Request
Related items