The formal analysis of CC security functional components
This document contain a formal analysis of the CC security functional components to evaluate the 搒pecialization level?of the components and a few interpretations derived from the results of the analysis.
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2003-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74362204/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841538947790929920 |
---|---|
author | HUANG Yuan-fei1 HE De-quan2 CHEN Ming-qi1 |
author_facet | HUANG Yuan-fei1 HE De-quan2 CHEN Ming-qi1 |
author_sort | HUANG Yuan-fei1 |
collection | DOAJ |
description | This document contain a formal analysis of the CC security functional components to evaluate the 搒pecialization level?of the components and a few interpretations derived from the results of the analysis. |
format | Article |
id | doaj-art-1d33e55032d443a3a7da364f53057385 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2003-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-1d33e55032d443a3a7da364f530573852025-01-14T07:29:49ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2003-01-0116416974362204The formal analysis of CC security functional componentsHUANG Yuan-fei1HE De-quan2CHEN Ming-qi1This document contain a formal analysis of the CC security functional components to evaluate the 搒pecialization level?of the components and a few interpretations derived from the results of the analysis.http://www.joconline.com.cn/zh/article/74362204/information securityCCsecurity function requirement |
spellingShingle | HUANG Yuan-fei1 HE De-quan2 CHEN Ming-qi1 The formal analysis of CC security functional components Tongxin xuebao information security CC security function requirement |
title | The formal analysis of CC security functional components |
title_full | The formal analysis of CC security functional components |
title_fullStr | The formal analysis of CC security functional components |
title_full_unstemmed | The formal analysis of CC security functional components |
title_short | The formal analysis of CC security functional components |
title_sort | formal analysis of cc security functional components |
topic | information security CC security function requirement |
url | http://www.joconline.com.cn/zh/article/74362204/ |
work_keys_str_mv | AT huangyuanfei1 theformalanalysisofccsecurityfunctionalcomponents AT hedequan2 theformalanalysisofccsecurityfunctionalcomponents AT chenmingqi1 theformalanalysisofccsecurityfunctionalcomponents AT huangyuanfei1 formalanalysisofccsecurityfunctionalcomponents AT hedequan2 formalanalysisofccsecurityfunctionalcomponents AT chenmingqi1 formalanalysisofccsecurityfunctionalcomponents |