This paper will consider how Common Criteria evolved, how it is defined and how it is used in practice. As an example we will look at how Common Criteria is applied to smart card evaluations. This paper will not attempt to define in detail Common Criteria, nor should the reader expect to understand it in sufficient detail to be able to immediately participate in evaluations. It will, however, give a gentle introduction to what is a complex and demanding evaluation methodology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
. Common Methodology for Information Technology Security Evaluation - Part 1 Introduction and General Model, August 2005 Version 2.3 CCMB-2005-08-001
. Common Methodology for Information Technology Security Evaluation - Part 2 Security Functional Requirements, August 2005 Version 2.3 CCMB-2005-08-002
. Common Methodology for Information Technology Security Evaluation - Part 3 Security Assurance Requirements, August 2005 Version 2.3 CCMB-2005-08-003
. Common Methodology for Information Technology Security Evaluation - Evaluation Methodology, August 2005 Version 2.3 CCMB-2005-08-004
. Common Methodology for Information Technology Security Evaluation - Part 1 Introduction and General Model, September 2006 Version 3.1 Release 1 CCMB-2006-09-001
. Common Methodology for Information Technology Security Evaluation - Part 2 Security Functional Components, September 2006 Version 3.1 Release 1 CCMB-2006-09-002
. Common Methodology for Information Technology Security Evaluation - Part 3 Security Assurance Components, September 2006 Version 3.1 Release 1 CCMB-2006-09-003
. Common Methodology for Information Technology Security Evaluation - Evaluation Methodology, September 2006 Version 3.1 Release 1 CCMB-2006-09-004
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Tierney, J. (2008). Common Criteria. In: Smart Cards, Tokens, Security and Applications. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-72198-9_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-72198-9_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-72197-2
Online ISBN: 978-0-387-72198-9
eBook Packages: Computer ScienceComputer Science (R0)