Skip to main content

Breakthroughs in standardisation of IT security criteria

  • Invited Lecture 2
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1172))

Included in the following conference series:

  • 147 Accesses

Abstract

The results of the Common Criteria project can indeed be viewed as a major breakthrough in the field of IT security. For the first time, six nations, representing both the military interests as well as civil government and private industry, have not only sat down at the table to iron out their philosophical differences in IT security but have achieved a great measure of accord. Admittedly, this accord not been won easily; it has come at a significant expense of both time and energy. Notwithstanding, the result is a very flexible and extensible approach that is designed to meet the needs of today and tomorrow; indeed the CC is the next generation criteria.

In doing so, the developers of the new CC have been careful to protect the fundamental technical principles of IT security, such as the Trusted Computing Base and Reference Mediation on the one side and effectiveness and correctness on the other. The resulting approach represented by the CC version 1 is a major contribution to international harmonisation. The fact that it has already been accepted by ISO as the basis for further work towards an international standard is indicative of the success of the project.

The desired end-state is now in sight — a level playing field for IT security products world-wide, where it should make no difference to the consumer where a product is manufactured or evaluated. The degree of trust to be placed in a product's secure and predictable operation will be known and accepted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Editor information

Josef Pieprzyk Jennifer Seberry

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Troy, E.F. (1996). Breakthroughs in standardisation of IT security criteria. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023292

Download citation

  • DOI: https://doi.org/10.1007/BFb0023292

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61991-8

  • Online ISBN: 978-3-540-49583-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics