ETSI EG 202 387 V1.1.1 (2005-04)Telecommunications

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

ETSIEG202387V1.1.1(2005-04)ETSIGuideTelecommunicationsandInternetconvergedServicesandProtocolsforAdvancedNetworking(TISPAN);SecurityDesignGuide;MethodforapplicationofCommonCriteriatoETSIdeliverablesETSIETSIEG202387V1.1.1(2005-04)2ReferenceDEG/TISPAN-07005-TechKeywordsapplication,IP,methodology,security,VoIPETSI650RoutedesLuciolesF-06921SophiaAntipolisCedex-FRANCETel.:+33492944200Fax:+33493654716SiretN°34862356200017-NAF742CAssociationàbutnonlucratifenregistréeàlaSous-PréfecturedeGrasse(06)N°7803/88ImportantnoticeIndividualcopiesofthepresentdocumentcanbedownloadedfrom:(PDF).Incaseofdispute,thereferenceshallbetheprintingonETSIprintersofthePDFversionkeptonaspecificnetworkdrivewithinETSISecretariat.Usersofthepresentdocumentshouldbeawarethatthedocumentmaybesubjecttorevisionorchangeofstatus.InformationonthecurrentstatusofthisandotherETSIdocumentsisavailableat:©EuropeanTelecommunicationsStandardsInstitute2005.Allrightsreserved.DECTTM,PLUGTESTSTMandUMTSTMareTradeMarksofETSIregisteredforthebenefitofitsMembers.TIPHONTMandtheTIPHONlogoareTradeMarkscurrentlybeingregisteredbyETSIforthebenefitofitsMembers.3GPPTMisaTradeMarkofETSIregisteredforthebenefitofitsMembersandofthe3GPPOrganizationalPartners.ETSIETSIEG202387V1.1.1(2005-04)3ContentsIntellectualPropertyRights................................................................................................................................6Foreword.............................................................................................................................................................6Introduction........................................................................................................................................................61Scope........................................................................................................................................................72References................................................................................................................................................73Definitionsandabbreviations...................................................................................................................83.1Definitions..........................................................................................................................................................83.2Abbreviations.....................................................................................................................................................94Securityinstandardization.......................................................................................................................94.1Communicationssecuritymodel........................................................................................................................94.2Standardsreviewandevaluation......................................................................................................................104.3Overalldevelopmentprocess...........................................................................................................................104.4Protocolstandardscontainingsecurity-relatedrequirements...........................................................................135OverviewofISO/IEC15408..................................................................................................................145.1IntroductiontotheCommonCriteria(CC)......................................................................................................145.1.1ContentsofaProtectionProfile(PP)..........................................................................................................145.1.2ContentsofaSecurityTarget(ST).............................................................................................................155.1.3CommonCriteriarelationships...................................................................................................................165.1.4EvaluationAssuranceLevels......................................................................................................................165.2OverviewofCCdocuments.............................................................................................................................175.2.1ISO/IEC15408-1:Introductionandgeneralmodel....................................................................................175.2.2ISO/IEC15408-2:Securityfunctionalrequirements..

1 / 60
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功