評価作業プログラムのガイドライン - JEITA
評価作業プログラムのガイドライン - JEITA
評価作業プログラムのガイドライン - JEITA
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Security Assurance Requirements version1.0 96/01/31 CCIB-96/013<br />
4) [CC3v2] Common Criteria for Information Technology Security Evaluation Part3:<br />
Security Assurance Requirements Version2.0 Beta 1 Oct 1997 CCIB-97/069<br />
5) [GPPS] ISO/IEC JTC 1 SC27/WG3 N391 Guide for production of PPs and STs , 1997-10-<br />
1<br />
6) [ITSEC] Information Technology Security Evaluation Criteria (ITSEC) June 1991,<br />
Version1.2<br />
7) [ITSEM] Information Technology Security Evaluation Manual (ITSEM) 10th September<br />
1993, Version1.0<br />
8) [CEM1] Common Evaluation Methodology for Information Technology Security Part1:<br />
Introduction and general model Version 0.6 97/01/11<br />
1.9 uv<br />
1.10 .v<br />
CEM Common Evaluation Methodology<br />
CLEF Commercial Laboratory Evaluation Facility<br />
CM Configuration Management<br />
DVS Development Security<br />
ETR Evaluation Technical Report<br />
EWP Evaluation Work Program<br />
FS Functional Specification<br />
HLD High Level Design<br />
LLD Low Level Design<br />
SOF Strength of Functions<br />
ST Security Target<br />
TOE Target of Evaluation<br />
TSF TOE Security Functions<br />
VA Vulnerability Assessment<br />
j{ ÛÑ~* Ñd e Ö×2Ü +<br />
f WX È› ghBd$k * +Bd&9h ®iÛÑ «{B ‰¯Öj È›5<br />
—` kl YZ i+<br />
IT TOE ; v mn IT +”(ù; HÇ’LíòW «opqr<br />
OS¯ ‰