References

  1. Common Criteria Organisation (2012): Common Criteria for Information Technology Security Evaluation. ISO/IEC international standard 15408. ISO/IEC. Version 3.1, Revision 4.
  2. DGA Maîtrise de l'Information (2012): Guide – Analyse de la Résistance aux Pannes d'un Équipement Cryptographique. Rapport Technique 2012/066099/DGA.MI/SSI/IPS/AC-DR. Version 4.0. Restricted access.
  3. Daniel Jackson (2002): Alloy: A Lightweight Object Modelling Notation. ACM Trans. Softw. Eng. Methodol. 11(2), pp. 256–290, doi:10.1145/505145.505149.
  4. Daniel Jackson (2012): Software Abstraction - Logic, Language, and Analysis. The MIT Press. Available at http://mitpress.mit.edu/books/software-abstractions.
  5. Gurvan Le Guernic (2007): Confidentiality Enforcement Using Dynamic Information Flow Analyses. Kansas State University. Chap.2 Bibliography.
  6. Tim McComb & Luke Wildman (2005): SIFA: A Tool for Evaluation of High-grade Security Devices. In: Proc. Australasian Conf. Information Security and Privacy, Lecture Notes in Computer Science 3574. Springer-Verlag, pp. 230–241, doi:10.1007/11506157_20.
  7. Chris Mills, Colin J. Fidge & Diane Corney (2012): Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. In: Proc. Australasian Information Security Conf., Conferences in Research and Practice in Information Technology 125. Australian Computer Society, Inc., pp. 59–70.
  8. Andrew P. Moore (2000): Network Pump (NP) Security Target. CC Security Target NRL/MR/5540–00-8459. Naval Research Laboratory.
  9. NATO Consultation, Command and Control Board (2009): INFOSEC Technical and Implementation Directive on Cryptographic Security and Cryptographic Mechanisms. Directive AC/322-D/0047-REV2 (INV). Restricted access.
  10. Andrew Rae & Colin J. Fidge (2005): Information Flow Analysis for Fail-Secure Devices. The Computer Journal 48(1), pp. 17–26, doi:10.1093/comjnl/bxh056.
  11. Andrei Sabelfeld & Andrew C. Myers (2003): Language-Based Information-Flow Security. IEEE J. on Selected Areas in Communications 21(1), pp. 5–19, doi:10.1109/JSAC.2002.806121.
  12. Trusted Computing Group (2011): Protection profile PC Client Specific Trusted Platform Module Family 1.2; Level 2; Revision 116 (PP TPM F1.2L2). CC Protection Profile. Version 1.2.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org