Formal Specifications of Security Policy Models
|
|
|
- Annabella Jacobs
- 10 years ago
- Views:
Transcription
1 Wolfgang Thumser T-Systems GEI GmbH
2 Overview and Motivation Structure of talk Position of FSPM within CC 3.1 and CEM 3.1 CC Requirements CEM Requirements National Scheme Realization of FSPM in terms of Features and Properties Security Functionality Security Functional Requirements Formal Systems Formal Proof of Security and Consistency Proof of Concept (An FSPM Example) Summary 2/22
3 Position of Formal Security Policy Model (CC 3.1) Form of Presentation ADV_SPM.1 Informal TSP-Model ADV_SPM.2 Semiformal TSP-Model ADV_SPM.3 ADV_SPM.1 Formal TSP-Model TSP Modeled Policies Principles Rules (Rules) Characteristics ADV_SPM.1.1C ADV_SPM.1.2C Content of Presentation TSP-Model Properties Features ADV_SPM.1.1D ADV_FSP.1.4C ST TSF SFR TSF ADV_SPM.1.3,4,5C FSP Relationships among ADV constructs and SPM 3/22
4 Position of Formal Security Policy Model (CEM 3.1) Section 11.7 (ADV_SPM) of CEM 3.1: Evaluation of sub-activity (ADV_SPM.1, section ) There is no general guidance; the scheme should be consulted on this sub-activity The national scheme of Germany by BSI provides AIS 34: Evaluation Methodology for CC Assurance Classes for EAL5+ Effective for CC Version 2.1 and CEM Version 1.0 Adaption necessary for CEM Version 3.1 Ideas based on... 4/22
5 Position of Formal Security Policy Model (Scheme) The following Interpretation by BSI is effective (Germany): AIS 39: Guideline for the Development and Evaluation of formal security policy models in the scope of ITSEC and Common Criteria, Version 1.1 Provides terminology and guidance Relates to CC Version 2.1 and CEM Version 1.0 Needs adaption to CC 3.1 and CEM 3.1 Proved useful in former evaluations of FSPMs 5/22
6 Realization of FSPM (Features & Properties) Syntax (formal) and Semantics (informal) classify Features and Properties as the formal counterpart of Characteristics and Rules, which constitute the SPM The terms are related by interpretation To show that The Characteristics enforce the Principles (Rules) one transforms the terms into their formal counterpart and formally proves that The Features imply the Properties We achieve Rigor, Precision and Consistency by formal treatment 6/22
7 Realization of FSPM (Example) The Characteristic that only the administrator may modify the access rights of an object is interpreting the following Feature x Sub y Obj : acc(mod( x, y)) acc( y) admi( x) where other axioms determine the behavior of predicate admi(), operation mod() and function in First order Predicate Logic acc() 7/22
8 Security Functionality According to definition of section 4 of part 1 in CC 3.1: The TSF as a subset of the TOE ensures correct enforcement of the SFRs The SFP (Security Function Policy) is expressible as a set of SFRs Which elements of TSF support which SFRs? Question can be answered by means of a table 8/22
9 Security Functionality Defined in TSF element SFRs PP FDP_IFC.1 X FDP_ITT.1 X FMT_LIM.1 X FRU_FLT.2 X X ST FPT_ACC.1 X FDP_ACF.1 X FMT_SMF.1 X Table: Relation of SFRs and SFs to the formal model 9/22
10 Security Functional Requirements SFRs are being mapped to the respective Security Policy Description consisting of Characteristics and Rules (Principles) along with their formal counterparts Security Invariant Description determined by Features and Properties by means of the following table 10/22
11 Security Functional Requirements TSF element SFR Security Policy Description (informal in section #) Security Invariant Description (formal in section #) Characteristic Principle Feature Property SF1 FRU_FLT.2.1 char_1 in sec1 prin_1 in sec1 feat_e in sec1 prop_e in sec1 SF2 FMT_LIM.1.1 n/a n/a SF4 FDP_IFC.1 FDP_ITT.1 SF6 FDP_ACC.1.1 char_e in section 3 prin_e in section 3 feat_e in section 3 prop_e in section 3 SF8 FDP_ACF.1.1 FDP_ACF.1.2 SF9 SF10 FMT_SMF.1 FRU_FLT.2.1 Table 2: Relation of SFRs and SFs to the formal model 11/22
12 Security Functional Requirements The developer should have to argue if she abstains from formally modeling certain SFRs some of the SFRs are not covered by the model According to state of the art IFC can always be modeled (if addressed in ST) strong arguments needed in case of abstention from modeling ACC as outlined in former CC version /22
13 Formal Systems According to CC 3.1, part 3, section A.5 Development: A Formal Specification consists of Formal System based upon well-established Mathematical Concepts well-defined Semantics Syntax Formal System Formal Language over some finite Alphabet Logical and Non-logical Axioms Rules of Inference to construct Formal Derivations of Theorems can be combinatorially manipulated and controlled 13/22
14 Formal Systems Realizations of Formal Systems include First Order Predicate Logic Intuitionistic Logic Modal Logic Temporal Logic of Actions Verification tools for Formal Systems include Isabelle MetaMath B-Method VSE II Autofocus 14/22
15 Formal Systems (Formal Proof of Security) ADV_SPM.1.2C of CC 3.1 requires: For all policies that are modelled, the model shall define security for the TOE and provide a formal proof that the TOE cannot reach a state that is not secure. In terms of Formal Systems this translates to: feat _ e : = { Ax1, Ax2,..., AxN} prop _ e = : thm where denotes the derivation operator and thm _ e formalizes secure state maintenance _ e, 15/22
16 Formal Systems (Consistency) Regarding Consistency 268 of CC 3.1 states: The confidence in the model is accompanied by a proof that it contains no inconsistencies. To achieve Consistency in spite of the incompleteness phenomenon: Conservative extensions by definition of and Interpretations (Models) of theories within consistent theories are consistent. So consistency can be obtained by literature reference. 16/22
17 Proof of Concept (FSPM Example) As an easy example of access control (FDP_ACC.1.1): Emergency supply consisting of seven power engines P1 P2 P3 P4 P5 P6 P7 S1 S2 S3 S4 S5 S6 Characteristics: Subjects: Power switches changing power state of adjacent power engines Objects: Power engines Operatns: Change power state of adjacent engines Initially: All engines turned on Principles: Cannot run into insecure state (all engines turned off) 17/22
18 Proof of Concept (FSPM Example) To formalize the Security Policy we take some first order theory SET equipped with: logical and nonlogical axioms for finite sets. classical rules of inference (modus ponens, tnt, etc.) for SET we may take e.g. ZF with Axiom of Infinity replaced by its negation equivalent to first order Peano Arithmetics (PA) well known to be consistent: PRA + Ind( ε 0 ) Cons( SET ) SET proves induction for first order formulas is easy to operate with (e.g. formalizable in Isabelle) 18/22
19 Proof of Concept (FSPM Example) Consider the following extension by definition of theory SET formalizing the characteristics in terms of features feat_e: Ax1: S = {s s : {1,2,,7} -> {0,1}} (state definition from objects) Ax2: s 0 ε S k ε {1,2,,7}: s 0 (k) = 0 s 1 ε S k ε {1,2,,7}: s 1 (k) = 1 (insecure and secure state) Ax3: X: Sec(X) s 0 ε X (secure set) Ax4: s ε S i ε {1,2,,6} k ε {1,2,,7}: (k=i k=i+1 op(i,s)(k)=1 s(k)) ( k=i k=i+1 op(i,s)(k) = s(k)) (state operation of subjects) Ax5: A 0 = {s 1 } n A n+1 = A n i ε {1,2,,6} op(i,a n ) A = i ε N A i (achievable states) 19/22
20 Proof of Concept (FSPM Example) Proof of Security Let prop_e consist of Thm_e: Thm_e: Sec(A) Prove that {Ax1,,Ax5} - Sec(A) in SET (Sketch of proof) Consider Def1: s ε S: odd(s) n ε N: s(1) + + s(7) = 2n+1 Def2: X S: Odd(X) s ε X: odd(s) We prove by induction on n using Ind: feat_e - n ε N: Odd(A n ) yielding feat_e - Odd(A) (by definition of A) (*) feat_e - X S: Odd(X) Sec(X), (**) since feat_e - odd(s 0 ) feat_e - Odd(A) Sec(A) (by Subst. from (**)) (***) feat_e - Sec(A) (by modus ponens from (*),(***)), q.e.d. 20/22
21 Proof of Concept (FSPM Example) Proof of Consistency SET + feat_e is consistent since Ax1 to Ax5 are extensions by definition of SET and SET is consistent in the first place Conservation of consistency for most well established mathematical theories, which are known to be consistent Fulfillment of requirement 268 of CC /22
22 Summary Impact of CC 3.1 requirements on formal security policy models Contribution to Security Functionality and Requirements Formalize Security Characteristics and Principles Formally prove properties of SPM Proof of Consistency of FSPM Developer has to show evidence Proof of concept by means of Example Topics not covered yet Formal Demonstration of Correspondence SPM <-> FSP 22/22
Joint Interpretation Library
for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0
Computer and Network Security
Computer and Network Security Common Criteria R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 [email protected] Common Criteria Consistent
Common Criteria v3.1 Vulnerability Assessment: What is new?
Common Criteria v3.1 Vulnerability Assessment: What is new? T-Systems GEI GmbH 25th-27th September, 2007, page 1. Road Map CC Part 3, Class AVA CEM, Class AVA CEM, Annex B 25th-27th September, 2007, page
CHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
BSI-PP-0004-2002. for. Protection Profile Secure Signature-Creation Device Type 1, Version 1.05. developed by
BSI-PP-0004-2002 for Protection Profile Secure Signature-Creation Device Type 1, Version 1.05 developed by CEN/ISSS Information Society Standardization System, Workshop on Electronic Signatures - Bundesamt
Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
Neighborhood Data and Database Security
Neighborhood Data and Database Security Kioumars Yazdanian, FrkdCric Cuppens e-mail: yaz@ tls-cs.cert.fr - cuppens@ tls-cs.cert.fr CERT / ONERA, Dept. of Computer Science 2 avenue E. Belin, B.P. 4025,31055
Rigorous Software Development CSCI-GA 3033-009
Rigorous Software Development CSCI-GA 3033-009 Instructor: Thomas Wies Spring 2013 Lecture 11 Semantics of Programming Languages Denotational Semantics Meaning of a program is defined as the mathematical
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
Introducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
Low Assurance Protection Profile for a VPN gateway
LAPP VPN gateway Low Assurance Protection Profile for a VPN gateway Version: 1.4 Date: 29/04/2005 Filename: lapp4_14 Product: VPN gateway Sponsor: SRC Security Research & Consulting GmbH, Graurheindorfer
Protection Profile for UK Dual-Interface Authentication Card
Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs
Joint Interpretation Library Security Evaluation and Certification of Digital Tachographs JIL interpretation of the Security Certification according to Commission Regulation (EC) 1360/2002, Annex 1B Version
BSI-PP-0003-2001. for. Smart Card Security User Group Smart Card Protection Profile (SCSUG-SCPP) Version 3.0. developed by
Certification Report Bundesamt für Sicherheit in der Informationstechnik BSI-PP-0003-2001 for Smart Card Security User Group Smart Card Protection Profile (SCSUG-SCPP) Version 3.0 developed by Smart Card
A Propositional Dynamic Logic for CCS Programs
A Propositional Dynamic Logic for CCS Programs Mario R. F. Benevides and L. Menasché Schechter {mario,luis}@cos.ufrj.br Abstract This work presents a Propositional Dynamic Logic in which the programs are
This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements.
3. Axioms of Set theory Before presenting the axioms of set theory, we first make a few basic comments about the relevant first order logic. We will give a somewhat more detailed discussion later, but
Low Assurance Protection Profile for a VoIP Infrastructure
Low Assurance Protection Profile for a VoIP Infrastructure Version 1.1 Date Author(s) Dirk-Jan Out Certification ID Sponsor File name No of pages 12 TNO-ITSEF BV VoIP Low Assurance Protection Profile 1.1
Automated Theorem Proving - summary of lecture 1
Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
System Assurance C H A P T E R 12
C H A P T E R 12 System Assurance 169 The aim of system assurance is to verify that a system enforces a desired set of security goals. For example, we would like to know that a new operating system that
Summary Last Lecture. Automated Reasoning. Outline of the Lecture. Definition sequent calculus. Theorem (Normalisation and Strong Normalisation)
Summary Summary Last Lecture sequent calculus Automated Reasoning Georg Moser Institute of Computer Science @ UIBK Winter 013 (Normalisation and Strong Normalisation) let Π be a proof in minimal logic
BSI-DSZ-CC-S-0040-2015. for. Dream Chip Technologies GmbH Germany. Dream Chip Technologies GmbH
BSI-DSZ-CC-S-0040-2015 for Dream Chip Technologies GmbH Germany of Dream Chip Technologies GmbH BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228
BSI-DSZ-CC-S-0035-2014. for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.
BSI-DSZ-CC-S-0035-2014 for GLOBALFOUNDRIES Singapore Pte. Ltd. of GLOBALFOUNDRIES Singapore Pte. Ltd. BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49
Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September 2012. Version 3.
Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model September 2012 Version 3.1 Revision 4 CCMB-2012-09-001 Foreword This version of the Common Criteria
Schedule. Logic (master program) Literature & Online Material. gic. Time and Place. Literature. Exercises & Exam. Online Material
OLC mputational gic Schedule Time and Place Thursday, 8:15 9:45, HS E Logic (master program) Georg Moser Institute of Computer Science @ UIBK week 1 October 2 week 8 November 20 week 2 October 9 week 9
Compucat Research Pty Limited 14 Wales St, Belconnen ACT 2617 ABN 48 008 602 980
Compucat Research Pty Limited 14 Wales St, Belconnen ACT 2617 ABN 48 008 602 980 Secure Optical Switch Version-01 Security Target P/N 2066-0012-05 P/N 2066-0012-05 February 08 Page -1 Table of Contents
Computer Security. Evaluation Methodology CIS 5370. Value of Independent Analysis. Evaluating Systems Chapter 21
Computer Security CIS 5370 Evaluating Systems Chapter 21 1 Evaluation Methodology 1. Set of security functionality requirements 2. Set of assurance a requirements e e 3. Methodology to determine if the
Security Domain Separation as Prerequisite for Business Flexibility. Igor Furgel T-Systems
Security Domain Separation as Prerequisite for Business Flexibility Igor Furgel T-Systems 23th-25th September, 2008, page 2 What are we speaking about? What is a Security Domain and what do we need it
Set theory as a foundation for mathematics
V I I I : Set theory as a foundation for mathematics This material is basically supplementary, and it was not covered in the course. In the first section we discuss the basic axioms of set theory and the
Certification Report BSI-DSZ-CC-0212-2004. for. Renesas AE45C1 (HD65145C1) Smartcard Integrated Circuit Version 01. from. Renesas Technology Corp.
Certification Report Federal Office for Information Security BSI-DSZ-CC-0212-2004 for Renesas AE45C1 (HD65145C1) Smartcard Integrated Circuit Version 01 from Renesas Technology Corp. - Bundesamt für Sicherheit
JMCS Northern Light Video Conferencing System Security Target
JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2
WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?
WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? introduction Many students seem to have trouble with the notion of a mathematical proof. People that come to a course like Math 216, who certainly
Chapter II. Controlling Cars on a Bridge
Chapter II. Controlling Cars on a Bridge 1 Introduction The intent of this chapter is to introduce a complete example of a small system development. During this development, you will be made aware of the
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Reference: ST January 2001 Version: 1.6 Europe: USA: CISCO Systems Ltd CISCO Systems Inc. 3 The Square 170 West Tasman Drive Stockley
Relations: their uses in programming and computational specifications
PEPS Relations, 15 December 2008 1/27 Relations: their uses in programming and computational specifications Dale Miller INRIA - Saclay & LIX, Ecole Polytechnique 1. Logic and computation Outline 2. Comparing
WOLLONGONG COLLEGE AUSTRALIA. Diploma in Information Technology
First Name: Family Name: Student Number: Class/Tutorial: WOLLONGONG COLLEGE AUSTRALIA A College of the University of Wollongong Diploma in Information Technology Final Examination Spring Session 2008 WUCT121
Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report
KECS-CR-16-36 Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report Certification No.: KECS-PP-0717-2016 2016. 6. 10 IT Security Certification Center History of Creation
Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development
Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University
TRUSTED SECURITY FILTER SECURITY TARGET
TRUSTED SECURITY FILTER SECURITY TARGET Edition: 4 29 Oct 07 Previous editions: Ed. 1 11 May 2006 Ed. 2 16 Aug 2006 Ed. 3 28 June 2007 Author: KKK Appr.: PÅT All pages in this document shall have the same
MIFARE DESFire EV1 MF3ICD81
MIFARE DESFire EV1 MF3ICD81 Rev.1.5 10 May 2011 BSI-DSZ-CC-0712 Evaluation Documentation Document information Info Keywords Abstract Content, MF3ICD81 Evaluation of the NXP Secure Smart Card Controller
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Common Criteria for IT security evaluation
STMicroelectronics ST33F1M/1M0/896/768/640/512E, SC33F1M0/896/768/640/512/384E, SM33F1M/1M0/896/768/640/512E, SE33F1M/1M0/896/768/640/512E, SL33F1M/1M0/896/768/640/512E, SP33F1ME, with dedicated software
Remarks on Non-Fregean Logic
STUDIES IN LOGIC, GRAMMAR AND RHETORIC 10 (23) 2007 Remarks on Non-Fregean Logic Mieczys law Omy la Institute of Philosophy University of Warsaw Poland [email protected] 1 Introduction In 1966 famous Polish
Lecture 13 of 41. More Propositional and Predicate Logic
Lecture 13 of 41 More Propositional and Predicate Logic Monday, 20 September 2004 William H. Hsu, KSU http://www.kddresearch.org http://www.cis.ksu.edu/~bhsu Reading: Sections 8.1-8.3, Russell and Norvig
Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012
Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa
Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1
Astaro Security Gateway V8 Packet Filter Version 1.000 Assurance Level EAL4+ Common Criteria v3.1 This Security Target also covers the secunet wall 2 packet filter Version : 1.03 Date: 2011-05-20 Author:
def: An axiom is a statement that is assumed to be true, or in the case of a mathematical system, is used to specify the system.
Section 1.5 Methods of Proof 1.5.1 1.5 METHODS OF PROOF Some forms of argument ( valid ) never lead from correct statements to an incorrect. Some other forms of argument ( fallacies ) can lead from true
CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs
CHAPTER 3 Methods of Proofs 1. Logical Arguments and Formal Proofs 1.1. Basic Terminology. An axiom is a statement that is given to be true. A rule of inference is a logical rule that is used to deduce
IBM WebSphere Message Broker Security Target
IBM WebSphere Message Broker Security Target Version 2.1.2 2007-08-22 Document History Version Date Summary Author 1.0 2006-10-23 Final EAL3 ST plus changes by IBM. SAIC / IBM 1.1 2006-12-11 Fixed inconsistencies.
This chapter is all about cardinality of sets. At first this looks like a
CHAPTER Cardinality of Sets This chapter is all about cardinality of sets At first this looks like a very simple concept To find the cardinality of a set, just count its elements If A = { a, b, c, d },
PROTECTION PROFILE DEVELOPMENT
PROTECTION PROFILE DEVELOPMENT FOR CARD ACCEPTANCE DEVICE (CAD) WITH BIOMETRIC Norahana Salimin [email protected] ICCC 2013 Sept 10-12 Orlando Content PPWG Background Challenge Lesson Learn Sneak
2. The Language of First-order Logic
2. The Language of First-order Logic KR & R Brachman & Levesque 2005 17 Declarative language Before building system before there can be learning, reasoning, planning, explanation... need to be able to
Beyond Propositional Logic Lukasiewicz s System
Beyond Propositional Logic Lukasiewicz s System Consider the following set of truth tables: 1 0 0 1 # # 1 0 # 1 1 0 # 0 0 0 0 # # 0 # 1 0 # 1 1 1 1 0 1 0 # # 1 # # 1 0 # 1 1 0 # 0 1 1 1 # 1 # 1 Brandon
isas Security Target Lite EWSE23EN90002.10
isas Security Target Lite EWSE23EN90002.10 FREQUENTIS 2012 History Chart Rev. Date Changed Page(s) Cause of Change Implemented 1.0 2012-05-15 All sections Initial Version Döderlein No. Action Name Signature
Forefront Identity Manager (FIM) 2010
Forefront Identity Manager (FIM) 2010 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 24-MAR-2012 Document history Version Date Description 0.1 28-APR-11 Initial draft for review.
! " # The Logic of Descriptions. Logics for Data and Knowledge Representation. Terminology. Overview. Three Basic Features. Some History on DLs
,!0((,.+#$),%$(-&.& *,2(-$)%&2.'3&%!&, Logics for Data and Knowledge Representation Alessandro Agostini [email protected] University of Trento Fausto Giunchiglia [email protected] The Logic of Descriptions!$%&'()*$#)
Fixed-Point Logics and Computation
1 Fixed-Point Logics and Computation Symposium on the Unusual Effectiveness of Logic in Computer Science University of Cambridge 2 Mathematical Logic Mathematical logic seeks to formalise the process of
Secuware Virtual System (SVS)
Secuware Virtual System (SVS) SECURITY TARGET EAL2 Copyright 2008 by SECUWARE All rights reserved. The information in this document is exclusive property of SECUWARE and may not be changed without express
Verifying Specifications with Proof Scores in CafeOBJ
Verifying Specifications with Proof Scores in CafeOBJ FUTATSUGI, Kokichi 二 木 厚 吉 Chair of Language Design Graduate School of Information Science Japan Advanced Institute of Science and Technology (JAIST)
ETSI TS 102 042: Electronic Signatures and Infrastructures (ESI): Policy
Abbreviations AIS BGBl BNetzA BSI CC CEM CSP DAR DATech DIN EAL ETR ETSI ISO IT ITSEC ITSEF ITSEM JIL PP SF SigG SigV SOF Anwendungshinweise und Interpretationen zum Schema [Guidance and Interpretations
Software Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
C038 Certification Report
C038 Certification Report TAXSAYA Online File name: Version: v1a Date of document: 15 August 2013 Document classification: For general inquiry about us or our services, please email: [email protected]
Certification Report
Certification Report EAL 3+ Evaluation of Extreme Networks ExtremeXOS Network Operating System v12.3.6.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005
Turing Degrees and Definability of the Jump Theodore A. Slaman University of California, Berkeley CJuly, 2005 Outline Lecture 1 Forcing in arithmetic Coding and decoding theorems Automorphisms of countable
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75
DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared
Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August 1999. Version 2.
Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model August 1999 Version 2.1 CCIMB-99-031 Part 1: Introduction and general model Foreword This version of
Information Technology Security Evaluation Criteria. ITSEC Joint Interpretation Library (ITSEC JIL)
S Information Technology Security Evaluation Criteria ITSEC Joint Interpretation Library (ITSEC JIL) Version 2.0 November 1998 This document is paginated from i to vi and from 1 to 65 ITSEC Joint Interpretation
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
Constructing Trusted Code Base XIV
Constructing Trusted Code Base XIV Certification Aleksy Schubert & Jacek Chrząszcz Today s news (on tvn24bis.pl) (June 6th on BBC) security vulnerability CVE-2014-0224 was discovered by Masashi Kikuchi
Foundational Proof Certificates
An application of proof theory to computer science INRIA-Saclay & LIX, École Polytechnique CUSO Winter School, Proof and Computation 30 January 2013 Can we standardize, communicate, and trust formal proofs?
Math 231b Lecture 35. G. Quick
Math 231b Lecture 35 G. Quick 35. Lecture 35: Sphere bundles and the Adams conjecture 35.1. Sphere bundles. Let X be a connected finite cell complex. We saw that the J-homomorphism could be defined by
EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0
EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305
Automata and Formal Languages
Automata and Formal Languages Winter 2009-2010 Yacov Hel-Or 1 What this course is all about This course is about mathematical models of computation We ll study different machine models (finite automata,
Security Standards. 17.1 BS7799 and ISO17799
17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information
Computer-Assisted Theorem Proving for Assuring the Correct Operation of Software
1 Computer-Assisted Theorem Proving for Assuring the Correct Operation of Software Amy Felty University of Ottawa Introduction to CSI5110 2 The General Problem From Evan I. Schwartz, Trust Me, I m Your
Low Assurance Security Target for a Cisco VoIP Telephony System
Low Assurance Security Target for a Cisco VoIP Telephony System Security Target Version 1.6 March 14, 2005 Document Control Preparation Action Name Date Prepared by: Rob Hunter of TNO-ITSEF BV on behalf
University of Ostrava. Reasoning in Description Logic with Semantic Tableau Binary Trees
University of Ostrava Institute for Research and Applications of Fuzzy Modeling Reasoning in Description Logic with Semantic Tableau Binary Trees Alena Lukasová Research report No. 63 2005 Submitted/to
Today s Agenda. Automata and Logic. Quiz 4 Temporal Logic. Introduction Buchi Automata Linear Time Logic Summary
Today s Agenda Quiz 4 Temporal Logic Formal Methods in Software Engineering 1 Automata and Logic Introduction Buchi Automata Linear Time Logic Summary Formal Methods in Software Engineering 2 1 Buchi Automata
Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16
Security Target McAfee Enterprise Mobility Management 12.0 Document Version 1.16 September 17, 2014 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec Ltd
Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September 2006. Version 3.
Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model September 2006 Version 3.1 Revision 1 CCMB-2006-09-001 Foreword This version of the Common Criteria
EAL4+ Security Target
EAL4+ Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 21-DEC-10 Document management Document identification Document ID Document title Release authority E14_EAL4_ASE Microsoft
From Workflow Design Patterns to Logical Specifications
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software
Math 55: Discrete Mathematics
Math 55: Discrete Mathematics UC Berkeley, Fall 2011 Homework # 5, due Wednesday, February 22 5.1.4 Let P (n) be the statement that 1 3 + 2 3 + + n 3 = (n(n + 1)/2) 2 for the positive integer n. a) What
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
How To Protect Your Computer From Being Hacked
Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications
MATHEMATICAL INDUCTION. Mathematical Induction. This is a powerful method to prove properties of positive integers.
MATHEMATICAL INDUCTION MIGUEL A LERMA (Last updated: February 8, 003) Mathematical Induction This is a powerful method to prove properties of positive integers Principle of Mathematical Induction Let P
Firewall Protection Profile
samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 [email protected] Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...
EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.
EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,
Note on some explicit formulae for twin prime counting function
Notes on Number Theory and Discrete Mathematics Vol. 9, 03, No., 43 48 Note on some explicit formulae for twin prime counting function Mladen Vassilev-Missana 5 V. Hugo Str., 4 Sofia, Bulgaria e-mail:
Integer roots of quadratic and cubic polynomials with integer coefficients
Integer roots of quadratic and cubic polynomials with integer coefficients Konstantine Zelator Mathematics, Computer Science and Statistics 212 Ben Franklin Hall Bloomsburg University 400 East Second Street
