Common Criteria Organisation (2012):
Common Criteria for Information Technology Security Evaluation.
ISO/IEC international standard 15408.
ISO/IEC.
Version 3.1, Revision 4.
DGA Maîtrise de l'Information (2012):
Guide – Analyse de la Résistance aux Pannes d'un Équipement Cryptographique.
Rapport Technique 2012/066099/DGA.MI/SSI/IPS/AC-DR.
Version 4.0. Restricted access.
Daniel Jackson (2002):
Alloy: A Lightweight Object Modelling Notation.
ACM Trans. Softw. Eng. Methodol. 11(2),
pp. 256–290,
doi:10.1145/505145.505149.
Gurvan Le Guernic (2007):
Confidentiality Enforcement Using Dynamic Information Flow Analyses.
Kansas State University.
Chap.2 Bibliography.
Tim McComb & Luke Wildman (2005):
SIFA: A Tool for Evaluation of High-grade Security Devices.
In: Proc. Australasian Conf. Information Security and Privacy,
Lecture Notes in Computer Science 3574.
Springer-Verlag,
pp. 230–241,
doi:10.1007/11506157_20.
Chris Mills, Colin J. Fidge & Diane Corney (2012):
Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device.
In: Proc. Australasian Information Security Conf.,
Conferences in Research and Practice in Information Technology 125.
Australian Computer Society, Inc.,
pp. 59–70.
Andrew P. Moore (2000):
Network Pump (NP) Security Target.
CC Security Target NRL/MR/5540–00-8459.
Naval Research Laboratory.
NATO Consultation, Command and Control Board (2009):
INFOSEC Technical and Implementation Directive on Cryptographic Security and Cryptographic Mechanisms.
Directive AC/322-D/0047-REV2 (INV).
Restricted access.
Andrew Rae & Colin J. Fidge (2005):
Information Flow Analysis for Fail-Secure Devices.
The Computer Journal 48(1),
pp. 17–26,
doi:10.1093/comjnl/bxh056.
Andrei Sabelfeld & Andrew C. Myers (2003):
Language-Based Information-Flow Security.
IEEE J. on Selected Areas in Communications 21(1),
pp. 5–19,
doi:10.1109/JSAC.2002.806121.
Trusted Computing Group (2011):
Protection profile PC Client Specific Trusted Platform Module Family 1.2; Level 2; Revision 116 (PP TPM F1.2L2).
CC Protection Profile.
Version 1.2.