09.08.2013 Views

評価作業プログラムのガイドライン - JEITA

評価作業プログラムのガイドライン - JEITA

評価作業プログラムのガイドライン - JEITA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Security Assurance Requirements version1.0 96/01/31 CCIB-96/013<br />

4) [CC3v2] Common Criteria for Information Technology Security Evaluation Part3:<br />

Security Assurance Requirements Version2.0 Beta 1 Oct 1997 CCIB-97/069<br />

5) [GPPS] ISO/IEC JTC 1 SC27/WG3 N391 Guide for production of PPs and STs , 1997-10-<br />

1<br />

6) [ITSEC] Information Technology Security Evaluation Criteria (ITSEC) June 1991,<br />

Version1.2<br />

7) [ITSEM] Information Technology Security Evaluation Manual (ITSEM) 10th September<br />

1993, Version1.0<br />

8) [CEM1] Common Evaluation Methodology for Information Technology Security Part1:<br />

Introduction and general model Version 0.6 97/01/11<br />

1.9 uv<br />

1.10 .v<br />

CEM Common Evaluation Methodology<br />

CLEF Commercial Laboratory Evaluation Facility<br />

CM Configuration Management<br />

DVS Development Security<br />

ETR Evaluation Technical Report<br />

EWP Evaluation Work Program<br />

FS Functional Specification<br />

HLD High Level Design<br />

LLD Low Level Design<br />

SOF Strength of Functions<br />

ST Security Target<br />

TOE Target of Evaluation<br />

TSF TOE Security Functions<br />

VA Vulnerability Assessment<br />

j{ ÛÑ~* Ñd e Ö×2Ü +<br />

f WX È› ghBd$k * +Bd&9h ®iÛÑ «{B ‰¯Öj È›5<br />

—` kl YZ i+<br />

IT TOE ; v mn IT +”(ù; HÇ’LíòW «opqr<br />

OS¯ ‰

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!