Published: October 10, 1995
Author(s)
Janet Cugini (NIST), Rob Dobry (NSA), Virgil Gligor (University of Maryland), Terry Mayfield (IDA)
Conference
Name: 18th National Information Systems Security Conference (NISSC)
Dates: 10/10/1995 - 10/13/1995
Location: Baltimore, Maryland, United States
Citation: Proceedings of the 18th National Information Systems Security Conference, vol. 1, pp. 310-321
The National Security Agency (NSA) with the cooperation of the National Institute of Standards and Technology (NIST) formed a technical group to create security requirements for distributed systems. These include requirements for data confidentiality, data integrity, cryptography, distributed identification and authentication, as well as for access control, auditing, system management, trusted path, and trusted recovery for distributed systems. These requirements are being reviewed for incorporation within the Common Criteria, which is a joint effort of the United States (NSA and NIST), Canada, France, Great Britain, and Germany to come up with a single criteria for security requirements.
The National Security Agency (NSA) with the cooperation of the National Institute of Standards and Technology (NIST) formed a technical group to create security requirements for distributed systems. These include requirements for data confidentiality, data integrity, cryptography, distributed...
See full abstract
The National Security Agency (NSA) with the cooperation of the National Institute of Standards and Technology (NIST) formed a technical group to create security requirements for distributed systems. These include requirements for data confidentiality, data integrity, cryptography, distributed identification and authentication, as well as for access control, auditing, system management, trusted path, and trusted recovery for distributed systems. These requirements are being reviewed for incorporation within the Common Criteria, which is a joint effort of the United States (NSA and NIST), Canada, France, Great Britain, and Germany to come up with a single criteria for security requirements.
Hide full abstract
Keywords
protection profiles; security targets; assignment; refinement; augmentation; cryptography; key management; distributed system; secure distributed system; realm; trusted channel; security perimeter; interconnection policies; simple subject; compound subject; delegation chain; restricted delegation chain; AND-chained identities; message origin authentication; mutual authentication
Control Families
None selected