Enabling Efficient Common Criteria Security Evaluation for Connected Vehicles

Author(s):  
Angelos Stamou ◽  
Panagiotis Pantazopoulos ◽  
Sammy Haddad ◽  
Angelos Amditis
2013 ◽  
Vol 7 (3) ◽  
pp. 16-35 ◽  
Author(s):  
Daniela Simić-Draws ◽  
Stephan Neumann ◽  
Anna Kahlert ◽  
Philipp Richter ◽  
Rüdiger Grimm ◽  
...  

Common Criteria and ISO 27001/IT-Grundschutz are well acknowledged evaluation standards for the security of IT systems and the organisation they are embedded in. These standards take a technical point of view. In legally sensitive areas, such as processing of personal information or online voting, compliance with the legal specifications is of high importance, however, for the users’ trust in an IT system and thus for the success of this system. This article shows how standards for the evaluation of IT security may be integrated with the KORA approach for law compatible technology design to the benefit of both – increasing confidence IT systems and their conformity with the law on one hand and a concrete possibility for legal requirements to be integrated into technology design from the start. The soundness of this interdisciplinary work will be presented in an exemplary application to online voting.


Author(s):  
Olaf Henniger

For establishing trust in the security of IT products, security evaluations by independent third-party testing laboratories are the first choice. In some fields of application of biometric methods (e.g., for protecting private keys for qualified electronic signatures), a security evaluation is even required by legislation. The common criteria for IT security evaluation form the basis for security evaluations for which wide international recognition is desired. Within the common criteria, predefined security assurance requirements describe actions to be carried out by the developers of the product and by the evaluators. The assurance components that require clarification in the context of biometric systems are related to vulnerability assessment. This chapter reviews the state of the art and gives a gentle introduction to the methodology for evaluating the security of biometric systems, in particular of behavioral biometric verification systems.


Sign in / Sign up

Export Citation Format

Share Document