원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
In these days, many organizations try to manage their information system in safe way due to more rapidly change in information security system environment. Accordingly, in each country enforces CC(Common Criteria) and CMVP(Cryptographic Module Validation Program). In this paper we compare CC and CMVP, and develop documents for submission according to
VE(vender requirement) in CMVP.
목차
Abstract
1. Introduction
2. What is the CC and CMVP?
2.1 CC(Common Criteria)
2.2 PP(Protection Profile)
2.3 ST(Security Target)
2.4 CMVP(Cryptographic Module Validation Program)
2.5 SP(Security Policy)
3. Reporting Document requirement
3.1 Documents requirement of FIPS 140-2
3.2 Documents requirement of KCMVP documents
3.3 Documents requirement of CC
4. Development of Documents Guideline
4.1 Development target
4.2 Document notation
4.3 List of reporting documents
4.4 Development of reporting document
5. Conclusions
Reference
1. Introduction
2. What is the CC and CMVP?
2.1 CC(Common Criteria)
2.2 PP(Protection Profile)
2.3 ST(Security Target)
2.4 CMVP(Cryptographic Module Validation Program)
2.5 SP(Security Policy)
3. Reporting Document requirement
3.1 Documents requirement of FIPS 140-2
3.2 Documents requirement of KCMVP documents
3.3 Documents requirement of CC
4. Development of Documents Guideline
4.1 Development target
4.2 Document notation
4.3 List of reporting documents
4.4 Development of reporting document
5. Conclusions
Reference
키워드
저자정보
참고문헌
자료제공 : 네이버학술정보
