Abstract
Die IT-Sicherheitskriterien der ZSI (das ‘Grüne Buch’) sind am 1.6.89 im Verlag des Bundesanzeigers erschienen. Zwischenzeitlich ist ebenfalls eine englische Fassung erschienen. Die Kriterien zur Beurteilung der Sicherheit und Vertrauenswürdigkeit von IT-Systemen haben weltweit Anerkennung gefunden. Es werden die Motivationen, Strategien und Ziele, die mit der Herausgabe dieser Kriterien verbunden sind, erläutert.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Literatur-Referenzen
USA
Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, Department of Defense(1985)
Passwort Management Guideline, CSC-STD-002-85, National Computer Security Center (1985)
Computer Security Requirements: “Guidance for applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments”,CSC-STD-003-85
Technical Rationale behind CSC-STD-003:“Guidance for applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environnent”,CSC-STD-004-85 [U5] A Guide to understanding Audit in Trusted Systems, NCSC-TG-001/V-2 (1988)
A Guide to understanding Discretionary Access Control in Trusted Systems, NCSC-TG-003/V-1 (1987)
Glossary of Computer Security Terms, NCSC-TG-004/V-1 (1988)
Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-005/V-1 (1987)
A Guide to understanding Configuration Management in Trusted Systems, NCSC-TG-006/V-1 (1988)
A Guide to understanding Design Documentation in Trusted Systems, NCSC-TG-007/V-1 (1988)
A Guide to understanding Trusted Distribution in Trusted Systems, NCSC-TG-008/V-1 (1988)
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-009/V-1 (1988)
Guidelines for Formal Verification Systems, NCSC-TG-014/V-1 (1989)
COMPUSECese Computer Security Glossary, NCSC-WA-001-85 (1985)
Personal Computer Security Considerations, NCSC-WA-002-85 (1985)
GB
Glossary of Computer Security Terms, CESG Computer Security Memorandum No. 1 Issue 2. 0 (1989)
UK Systems Security Confidence Levels, CESG Computer Security Memorandum No. 3: Issue 1. 1 (1989)
CESG Development Programme: TNET, CESG Computer Security Memorandum No. 4 (1989)
Evaluations Levels Manual, Department of Trade and Industry (DTI) Commercial Computer Security Centre, Version 3. 0 (Draft) (1989)
Security Functionality Manual, DTI Commercial Computer Security Centre, Version 3. 0 (Draft) (1989)
Overview of Documentation, DTI,Version 3. 0 (1989)
Glossary, DTI, Version 3. 0 (1989)
Users Code of Practice, DTI, Version 13. 0, (1989)
Evaluation and Certification Manual, DTI, Version 3. 0, (1989)
Vendors Code of Practice, DTI, Version 3. 0, (1989)
F
F1] Glossaire Anglais-Francais relatif a la Securite des Systemes d’Information, Version 2 (Draft) (1988)
Kanada
Canadian Trusted Computer Product Evaluation Criteria, Version 1.0 ( Draft ), Systems Security Centre- Communications Security Establishment- Government of Canada (1989)
NATO
NATO Trusted Computer System Evaluation Criteria, NATO AC/35-D/1027(1987)
Editor information
Rights and permissions
Copyright information
© 1990 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig
About this chapter
Cite this chapter
Kersten, H. (1990). Pro: Die IT-Sicherheitskriterien der ZSI. In: Lippold, H., Schmitz, P. (eds) Sicherheit in netzgestützten Informationssystemen. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-83581-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-322-83581-9_3
Publisher Name: Vieweg+Teubner Verlag
Print ISBN: 978-3-528-05105-1
Online ISBN: 978-3-322-83581-9
eBook Packages: Springer Book Archive