skip to main content
10.1145/1141277.1141701acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

A security specification verification technique based on the international standard ISO/IEC 15408

Published: 23 April 2006 Publication History

Abstract

This paper proposes a security specification verification technique based on the international standard ISO/IEC 15408. We formalized the security criteria of ISO/IEC 15408 and developed the verification technique of security specifications based on the formalized criteria with formal methods. With the technique, one can formally verify whether or not specifications satisfy the security criteria of ISO/IEC 15408. Ambiguity and/or oversight about security in specifications written in natural language can also be detected.

References

[1]
Advanced Information Systems Engineering Laboratory. Security Functional Requirement Management Database. Saitama University. http://queen.aise.ics.saitama-u.ac.jp/
[2]
Y. Bertot and P. Casteran. Interactive Theorem Proving and Program Development. Springer-Verlag. 2004.
[3]
Common Criteria Org. Evaluated Product Files. http://www.commoncriteriaportal.org/public/files/epfiles/
[4]
ISO/IEC 13568 Standard. Information Technology - Z Formal Specification Notation - Syntax, Type System and Semantics. 2002.
[5]
ISO/IEC 15408 Standard. Common Criteria for Information Technology Security Evaluation Version 2.2 Revision 256. 2004.
[6]
ORA Canada. Z/EVES. http://www.ora.on.ca/z-eves/welcome.html
[7]
S. Morimoto and J. Cheng. Patterning Protection Profiles by UML for Security Specifications. In Proc. of the IEEE 2005 International Conference on Intelligent Agents, Web Technology and Internet Commerce (IAWTIC'05), November 2005.
[8]
S. Morimoto and J. Cheng. Modeling Protection Profiles by UML and their Formal Verification. IEICE Trans., Vol. J89-D, No.4, April 2006 (in Japanese).
[9]
S. Morimoto, S. Shigematsu, Y. Goto, and J. Cheng. A Security Specification Verification Technique Using Theorem Proving and Model Checking Based on the International Standard ISO/IEC 15408. In Proc. of the Second Symposium on Science and Technology for System Verification, pages, 12--23, National Institute of Advanced Industrial Science and Technology, October 2005 (in Japanese).
[10]
B. Potter, J. Sinclair, and D. Till. An Introduction to Formal Specification and Z 2nd Edition. International Series in Computer Science, Prentice-Hall, 1996.

Cited By

View all
  • (2010)Laws and Standards for Secure e-Healthcare InformationElectronic Healthcare Information Security10.1007/978-0-387-84919-5_3(59-100)Online publication date: 2010
  • (2006)A security requirement management database based on ISO/IEC 15408Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III10.1007/11751595_1(1-10)Online publication date: 8-May-2006
  • (2005)Patterning Protection Profiles by UML for Security SpecificationsInternational Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)10.1109/CIMCA.2005.1631590(946-951)Online publication date: 2005

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '06: Proceedings of the 2006 ACM symposium on Applied computing
April 2006
1967 pages
ISBN:1595931082
DOI:10.1145/1141277
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 April 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Z notation
  2. common criteria
  3. theorem-proving

Qualifiers

  • Article

Conference

SAC06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2010)Laws and Standards for Secure e-Healthcare InformationElectronic Healthcare Information Security10.1007/978-0-387-84919-5_3(59-100)Online publication date: 2010
  • (2006)A security requirement management database based on ISO/IEC 15408Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III10.1007/11751595_1(1-10)Online publication date: 8-May-2006
  • (2005)Patterning Protection Profiles by UML for Security SpecificationsInternational Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)10.1109/CIMCA.2005.1631590(946-951)Online publication date: 2005

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media