A case study in applying common criteria to development process of virtual private network

Sang Ho Kim, Choon Seong Leem

Research output: Contribution to journalArticle

Abstract

IT Security evaluation based on Common Criteria (CC, ISO/IEC15408), international standard for evaluation of security properties of IT products and systems, requires evaluation deliverables such as development and operational documents of TOE(Target of Evaluation) according to EAL(Evaluation Assurance Level). As most developers commonly prepare evaluation deliverables after their products have been developed, additional costs and time have been invested to be ready for evaluation evidences in reverse-engineering. But CC does not provide any methodological support to prepare evaluation deliverables, and furthermore, related work is not sufficient. In this paper, we present how Common Criteria apply to development process of VPN (Virtual Private Network). We demonstrate our idea by means of case study - developing RVPN V1.0 according to EAL4 in CC.

Original languageEnglish
Pages (from-to)608-616
Number of pages9
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3043
Publication statusPublished - 2004 Dec 1

Fingerprint

Virtual private networks
Reverse engineering
Development Process
Evaluation
Costs
Reverse Engineering
Sufficient
Target

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

@article{9c3b29fb6522482fb3eaffb4195306bc,
title = "A case study in applying common criteria to development process of virtual private network",
abstract = "IT Security evaluation based on Common Criteria (CC, ISO/IEC15408), international standard for evaluation of security properties of IT products and systems, requires evaluation deliverables such as development and operational documents of TOE(Target of Evaluation) according to EAL(Evaluation Assurance Level). As most developers commonly prepare evaluation deliverables after their products have been developed, additional costs and time have been invested to be ready for evaluation evidences in reverse-engineering. But CC does not provide any methodological support to prepare evaluation deliverables, and furthermore, related work is not sufficient. In this paper, we present how Common Criteria apply to development process of VPN (Virtual Private Network). We demonstrate our idea by means of case study - developing RVPN V1.0 according to EAL4 in CC.",
author = "Kim, {Sang Ho} and Leem, {Choon Seong}",
year = "2004",
month = "12",
day = "1",
language = "English",
volume = "3043",
pages = "608--616",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - A case study in applying common criteria to development process of virtual private network

AU - Kim, Sang Ho

AU - Leem, Choon Seong

PY - 2004/12/1

Y1 - 2004/12/1

N2 - IT Security evaluation based on Common Criteria (CC, ISO/IEC15408), international standard for evaluation of security properties of IT products and systems, requires evaluation deliverables such as development and operational documents of TOE(Target of Evaluation) according to EAL(Evaluation Assurance Level). As most developers commonly prepare evaluation deliverables after their products have been developed, additional costs and time have been invested to be ready for evaluation evidences in reverse-engineering. But CC does not provide any methodological support to prepare evaluation deliverables, and furthermore, related work is not sufficient. In this paper, we present how Common Criteria apply to development process of VPN (Virtual Private Network). We demonstrate our idea by means of case study - developing RVPN V1.0 according to EAL4 in CC.

AB - IT Security evaluation based on Common Criteria (CC, ISO/IEC15408), international standard for evaluation of security properties of IT products and systems, requires evaluation deliverables such as development and operational documents of TOE(Target of Evaluation) according to EAL(Evaluation Assurance Level). As most developers commonly prepare evaluation deliverables after their products have been developed, additional costs and time have been invested to be ready for evaluation evidences in reverse-engineering. But CC does not provide any methodological support to prepare evaluation deliverables, and furthermore, related work is not sufficient. In this paper, we present how Common Criteria apply to development process of VPN (Virtual Private Network). We demonstrate our idea by means of case study - developing RVPN V1.0 according to EAL4 in CC.

UR - http://www.scopus.com/inward/record.url?scp=35048824933&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=35048824933&partnerID=8YFLogxK

M3 - Article

VL - 3043

SP - 608

EP - 616

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

ER -