Abstract
This paper traces the history and evolution of the various criteria efforts associated with computer system and network security. It notes several new security requirements arising from new system architectures, intense networking, different operational environments, and evolving online services. Finally, it speculates on the continuing role of the Common Criteria.
Chapter PDF
Similar content being viewed by others
Keywords
References
DoD Computer Security Center, National Security Agency (15 Aug 1983) Department of Defense Trusted Computer System Evaluation Criteria,CSC-STD-001–83. While the document is characterized in its preface as ‘a uniform set of requirements and basic evaluation classes,’ the TCSEC really filled the role of a standard and was later adopted as a USG/DoD standard.
DoD Computer Security Center, National Security Agency (23 June 1985) Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments,CSC-STD-003–85.
National Computer Security Center, National Security Agency (31 July 1987) Trusted Network Interpretation,NCSC-TG-005.
National Computer Security Center, National Security Agency (April 1991) Trusted Database Management System Interpretation,NCSC-TG-021.
Peters, Bernard (1965) Security Considerations in a Multi-programmed Computer System, AFIPS Conference Proceedings, 30, 283 ff.
Ware, Willis H. [editor] (1970) Security Controls for Ccomputer Systems, Report of Defense Science Board Task Force on Computer Security, R-609–1. Published by RAND Corporation for the Department of Defense in February 1970 as a classified document and republished as an unclassified document in October, 1979.
Ware, Willis H. (1995) A Retrospective on the Criteria Movement. Presented at the 18th National Information Systems Security Conference, October 10–13, 1995, Baltimore, MD.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Ware, W.H. (1997). New vistas on info-system security. In: Yngström, L., Carlsen, J. (eds) Information Security in Research and Business. IFIP — The International Federation for Information Processing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35259-6_15
Download citation
DOI: https://doi.org/10.1007/978-0-387-35259-6_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5481-0
Online ISBN: 978-0-387-35259-6
eBook Packages: Springer Book Archive