A formal verification and simulation of Common Criteria Recognition Arrangement (CCRA)
Common Criteria (CC) is an international standard body for certifying security products and services. CC is used for information technology security evaluation that covers generic security model, security functional and security assurance components. The standard is published to unify pre-existing s...
| Main Authors: | Mat Isa, Mohd Anuar, Mahmod, Ramlan, Udzir, Nur Izura, Ab Manan, Jamalul-lail, Dehghantanha, Ali, Shamsuddin, Solahuddin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
World Academic Press, World Academic Union
2017
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/60651/ http://psasir.upm.edu.my/id/eprint/60651/1/A%20formal%20veri%EF%AC%81cation%20and%20simulation%20of%20Common%20Criteria%20Recognition%20Arrangement%20%28CCRA%29.pdf |
Similar Items
A unified trust model for common criteria recognition arrangement for product acceptance
by: Mat Isa, Mohd Anuar
Published: (2018)
by: Mat Isa, Mohd Anuar
Published: (2018)
Formal verification of RFID system using model verification agent
by: Lockman, Muhammad Tarmizi
Published: (2012)
by: Lockman, Muhammad Tarmizi
Published: (2012)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
A formal approach to modelling and verification of context-aware systems
by: Ul-Haque, Hafiz Mahfooz
Published: (2017)
by: Ul-Haque, Hafiz Mahfooz
Published: (2017)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Face recognition for identify verification in exams locations
by: Ng, Suet Eng
Published: (2023)
by: Ng, Suet Eng
Published: (2023)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Advertising campaign of gum littering problem among Malaysians in urban cities / Nuranis Mohd Nor Jamalul Lail
by: Mohd Nor Jamalul Lail, Nuranis
Published: (2013)
by: Mohd Nor Jamalul Lail, Nuranis
Published: (2013)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Malay speaker dependent digits recognition
with improved backpropagation
by: Ummu Salamah Mohamad,, et al.
Published: (2004)
by: Ummu Salamah Mohamad,, et al.
Published: (2004)
Malay speaker dependent digits recognition with improved backpropagation
by: Mohamad, Ummu Salamah, et al.
Published: (2004)
by: Mohamad, Ummu Salamah, et al.
Published: (2004)
Union Recognition, Bargaining Arrangements and Voice Mechanisms in US and Australian MNEs in Australia
by: Boyle, B., et al.
Published: (2013)
by: Boyle, B., et al.
Published: (2013)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
Signature Verification And Forgery Detection Including Recognition Of Courtesy Amount In Cheques
by: Mohd Yusof, Mohd Hafizuddin
Published: (2005)
by: Mohd Yusof, Mohd Hafizuddin
Published: (2005)
Regularized kernel discriminant analysis with a robust kernel for face recognition and verification
by: Zafeiriou, Stefanos, et al.
Published: (2012)
by: Zafeiriou, Stefanos, et al.
Published: (2012)
Multi-criteria evaluation in website quality determination
by: Zulzalil, Hazura, et al.
Published: (2012)
by: Zulzalil, Hazura, et al.
Published: (2012)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Extending TLS with mutual attestation for platform integrity assurance
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Cancelable and hybrid biometric cryptosystems: current directions and open research issues
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
The interrelatedness of formal, non-formal and informal learning
by: Cameron, Roslyn, et al.
Published: (2012)
by: Cameron, Roslyn, et al.
Published: (2012)
A survey on cyber-crime prediction techniques
by: Shaerpour, Kaveh, et al.
Published: (2013)
by: Shaerpour, Kaveh, et al.
Published: (2013)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Handwritten Arabic word/character recognition : common approaches
by: O. H., Assma, et al.
Published: (2011)
by: O. H., Assma, et al.
Published: (2011)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
Similar Items
-
A unified trust model for common criteria recognition arrangement for product acceptance
by: Mat Isa, Mohd Anuar
Published: (2018) -
Formal verification of RFID system using model verification agent
by: Lockman, Muhammad Tarmizi
Published: (2012) -
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009) -
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013) -
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)