@techreport(CC-3.1, author = "{Common Criteria Organisation}", year = "2012", title = "{Common Criteria for Information Technology Security Evaluation}", type = "ISO/IEC international standard", number = "15408", institution = "ISO/IEC", note = "Version 3.1, Revision 4", ) @techreport(DGA-MI:2012:guide-SeD_v4, author = "{DGA Ma\IeC {\^\i }trise de l'Information}", year = "2012", title = "{Guide -- Analyse de la R\IeC {\'e}sistance aux Pannes d'un \IeC {\'E}quipement Cryptographique}", type = "Rapport Technique", number = "2012/066099/DGA.MI/SSI/IPS/AC-DR", note = "Version 4.0. Restricted access", ) @article(Jackson:2002:alloy-alomn, author = "Daniel Jackson", year = "2002", title = "{Alloy: A Lightweight Object Modelling Notation}", journal = "ACM Trans. Softw. Eng. Methodol.", volume = "11", number = "2", pages = "256--290", doi = "10.1145/505145.505149", ) @book(jackson:2012:salla, author = "Daniel Jackson", year = "2012", title = "{S}oftware {A}bstraction - {L}ogic, {L}anguage, and {A}nalysis", publisher = "The MIT Press", url = "http://mitpress.mit.edu/books/software-abstractions", ) @phdthesis(leguernic07thesis, author = "Gurvan Le Guernic", year = "2007", title = "{C}onfidentiality {E}nforcement {U}sing {D}ynamic {I}nformation {F}low {A}nalyses", school = "Kansas State University", note = "Chap.2 Bibliography", ) @inproceedings(mccomb:2005:SIFA, author = "Tim McComb and Luke Wildman", year = "2005", title = "{SIFA: A Tool for Evaluation of High-grade Security Devices}", booktitle = "Proc. Australasian Conf. Information Security and Privacy", series = "Lecture Notes in Computer Science", volume = "3574", publisher = "Springer-Verlag", pages = "230--241", doi = "10.1007/11506157\_20", ) @inproceedings(mills:2012:tsdasced, author = "Chris Mills and Colin J. Fidge and Diane Corney", year = "2012", title = "{Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device}", booktitle = "Proc. Australasian Information Security Conf.", series = "Conferences in Research and Practice in Information Technology", volume = "125", publisher = "Australian Computer Society, Inc.", pages = "59--70", ) @techreport(moore:2000:ST-NP, author = "Andrew P. Moore", year = "2000", title = "{Network Pump (NP) Security Target}", type = "CC Security Target", number = "NRL/MR/5540--00-8459", institution = "Naval Research Laboratory", ) @techreport(NC3B:2009:tidcscm, author = "{NATO Consultation, Command and Control Board}", year = "2009", title = "{INFOSEC Technical and Implementation Directive on Cryptographic Security and Cryptographic Mechanisms}", type = "Directive", number = "AC/322-D/0047-REV2 (INV)", note = "Restricted access", ) @article(rae:2005:ifa4fsd, author = "Andrew Rae and Colin J. Fidge", year = "2005", title = "{Information Flow Analysis for Fail-Secure Devices}", journal = "The Computer Journal", volume = "48", number = "1", pages = "17--26", doi = "10.1093/comjnl/bxh056", ) @article(sabelfeld+03lbifs, author = "Andrei Sabelfeld and Andrew C. Myers", year = "2003", title = "Language-Based Information-Flow Security", journal = "IEEE J. on Selected Areas in Communications", volume = "21", number = "1", pages = "5--19", doi = "10.1109/JSAC.2002.806121", ) @techreport(TCG:2011:PP_TPM, author = "{Trusted Computing Group}", year = "2011", title = "{Protection profile PC Client Specific Trusted Platform Module Family 1.2; Level 2; Revision 116 (PP TPM F1.2L2)}", type = "CC Protection Profile", note = "Version 1.2", )