Skip to main content

Common Criteria

A brief history and overview

  • Chapter
Smart Cards, Tokens, Security and Applications

This paper will consider how Common Criteria evolved, how it is defined and how it is used in practice. As an example we will look at how Common Criteria is applied to smart card evaluations. This paper will not attempt to define in detail Common Criteria, nor should the reader expect to understand it in sufficient detail to be able to immediately participate in evaluations. It will, however, give a gentle introduction to what is a complex and demanding evaluation methodology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. . Common Methodology for Information Technology Security Evaluation - Part 1 Introduction and General Model, August 2005 Version 2.3 CCMB-2005-08-001

    Google Scholar 

  2. . Common Methodology for Information Technology Security Evaluation - Part 2 Security Functional Requirements, August 2005 Version 2.3 CCMB-2005-08-002

    Google Scholar 

  3. . Common Methodology for Information Technology Security Evaluation - Part 3 Security Assurance Requirements, August 2005 Version 2.3 CCMB-2005-08-003

    Google Scholar 

  4. . Common Methodology for Information Technology Security Evaluation - Evaluation Methodology, August 2005 Version 2.3 CCMB-2005-08-004

    Google Scholar 

  5. . Common Methodology for Information Technology Security Evaluation - Part 1 Introduction and General Model, September 2006 Version 3.1 Release 1 CCMB-2006-09-001

    Google Scholar 

  6. . Common Methodology for Information Technology Security Evaluation - Part 2 Security Functional Components, September 2006 Version 3.1 Release 1 CCMB-2006-09-002

    Google Scholar 

  7. . Common Methodology for Information Technology Security Evaluation - Part 3 Security Assurance Components, September 2006 Version 3.1 Release 1 CCMB-2006-09-003

    Google Scholar 

  8. . Common Methodology for Information Technology Security Evaluation - Evaluation Methodology, September 2006 Version 3.1 Release 1 CCMB-2006-09-004

    Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Tierney, J. (2008). Common Criteria. In: Smart Cards, Tokens, Security and Applications. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-72198-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-72198-9_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-72197-2

  • Online ISBN: 978-0-387-72198-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics