. "64"^^ . "ACM SIGSOFT Software Engineering"@fr . "CCpart2v21"@fr . . "69"^^ . "Security & Privacy, IEEE"@fr . "Keblawi, F"@fr . "D Greve"@fr . "Tobita, T."@fr . "Dusart, P."@fr . "Shoichi Morimoto"@fr . "1953"^^ . . "Preschern-2012"@fr . "Isa, M.A.M."@fr . "CCMRA"@fr . "Techniques de l'ing\u00E9nieur. S\u00E9curit\u00E9 des syst\u00E8mes d'information"@fr . "SAC '07 Proceedings of the 2007 ACM symposium on Applied computing"@fr . "Information and Communication Technologies, 2006. ICTTA '06. 2nd"@fr . "decret"@fr . "107"^^ . . "2013-12-03"^^ . . "Memphis, TN"@fr . "Richards-2004"@fr . "Manchester"@fr . . "2010"^^ . "2011"^^ . "2008"^^ . "2009"^^ . . "2012"^^ . . "2013"^^ . "2002"^^ . "Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference"@fr . "2000"^^ . "Kaneko, H."@fr . "2006"^^ . "2007"^^ . . "2004"^^ . "2005"^^ . "1994"^^ . "Taguchi, K."@fr . . "129"^^ . "1999"^^ . "Ardi-2009"@fr . "66568"^^ . "juillet"@fr . "CCMRA Comit\u00E9 : Proc\u00E9dures"@fr . . . "152"^^ . "Common Criteria"@pt . "155"^^ . "0"^^ . "1"^^ . "Yoshioka, N"@fr . "avril"@fr . "Chochois"@fr . "Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on"@fr . "Irvine, C.E."@fr . "Software Engineering and Advanced Applications , 2012 38th EUROMICRO Conference on"@fr . "Taguchi-2010"@fr . . "Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations"@fr . "Alexander Wisspeintner"@fr . . "A comparison of the Common Criteria with proposals of information systems security requirements"@fr . "Dec."@fr . . "973349"^^ . "NIAP and COTS Products Evaluation"@fr . . . . "Karpati"@fr . "Castillos, K.C."@fr . "Romero-Mariona, J."@fr . . . . . "Sullivan, D."@fr . . "New York, NY, USA"@fr . "Isa-2012"@fr . "Ardi, S."@fr . . "Ware-2005"@fr . . . "M Wilding"@fr . "legifrance.gouv.fr"@fr . "Aug."@fr . "fr"@fr . . "Beatty-2007"@fr . "November"@fr . "Ledru, Y."@fr . "Sept."@fr . "High robustness requirements in a Common Criteria protection profile"@fr . "Romero-Mariona-2007"@fr . "Dec"@fr . "Journal of Object Technology"@fr . "Shoichi-2007"@fr . . "CCpart3v31"@fr . "Sauveron-2007"@fr . "Damascus"@fr . . "Cesme, Izmir"@fr . "978"^^ . "CCARCH: Architecting Common Criteria Security Requirements"@fr . "Opdahl"@fr . "commoncriteriaportal.org"@fr . . "Kallberg-2012"@fr . "Magnin"@fr . . "Structuring Modular Safety Software Certification by Using Common Criteria Concepts"@fr . "Iachello, G."@fr . "2013-12-15"^^ . "Software Testing, Verification and Validation Workshops, 2009. ICSTW '09. International Conference on"@fr . "273"^^ . "ssi.gouv.fr"@fr . "Future Generation Communication and Networking"@fr . . "CCpart1v21"@fr . . . "Using Common Criteria to Assess Quality of Web Services"@fr . . . "Sharifipanah, H."@fr . "juin"@fr . . "Mellado, D."@fr . . "295"^^ . "Kallberg"@fr . . "Vetterling-2002"@fr . . . . . . . "Beatty"@fr . "http://www.commoncriteriaportal.org/news/|site=commoncriteriaportal.org|titre=Portail Crit\u00E8res communs"@fr . . "Crit\u00E8res Communs Part 1: Introduction et mod\u00E8le general"@fr . "Does the common criteria paradigm have a future?"@fr . "SoutheastCon, 2006. Proceedings of the IEEE"@fr . "Nguyen-2006"@fr . "Software Engineering Advances, 2009. ICSEA '09. Fourth International Conference on"@fr . . "Singapore"@fr . "Levin, T.E"@fr . . "2013-12-14"^^ . "Bialas-2009"@fr . "July-Aug"@fr . "Michael"@fr . "CCMRAC-Certif"@fr . "D\u00E9cret 834"@fr . "Vers une \u00E9valuation quantitative de la s\u00E9curit\u00E9 informatique"@fr . "London"@fr . "WM Vanfleet"@fr . . "Luembourg"@fr . "Pretre, V."@fr . "Richardson, D.J."@fr . . "1506"^^ . . "349"^^ . "Mellado-2006"@fr . "Denver, CO"@fr . . "CCMRA Certificats"@fr . "Yuichi Goto"@fr . "Common Criteria"@en . "CEM"@fr . . . . "Nicolas"@fr . "3287"^^ . . "Shinjiro Shigematsu"@fr . . . . . . "Workshop, 2004 - cs.utexas.edu"@fr . "2013-12-05"^^ . "Dependability of Computer Systems, 2009. DepCos-RELCOMEX '09. Fourth International Conference on"@fr . . "CommonCriteria"@fr . . "Cyber Security, Cyber Warfare and Digital Forensic , 2012 International Conference on"@fr . . "Secure systems development based on the common criteria: the PalME project"@fr . . . . "New Orleans, LA"@fr . "sogisportal.eu"@fr . "Formal verification of security specifications with common criteria"@fr . "Crit\u00E8res communs"@fr . "Porto"@fr . "CCNews"@fr . . . "Shahmehri, N."@fr . . "Dietrich, K."@fr . . "Marc Dacier"@fr . "Kuala Lumpur"@fr . "Common Criteria"@uk . . . "Fed. Aviation Adm"@fr . . "ACM New York, NY, USA \u00A92007"@fr . "431"^^ . . "419"^^ . . "423"^^ . "mars"@fr . "Bialas, A."@fr . . "Crit\u00E8res Communs Part 3: Exigences d'assurance de s\u00E9curit\u00E9"@fr . . "Common Criteria Mutual RecognitionBeatty"@fr . "Information Assurance, 2006. IWIA 2006. Fourth IEEE International Workshop on"@fr . "Crit\u00E8res Communs Part 3: Exigences d'assurance de s\u00E9curit\u00E9 version 3"@fr . "http://www.ssi.gouv.fr/fr/certification-qualification/cc/les-accords-de-reconnaissance-mutuelle.html|site=ssi.gouv.fr|titre= Accord de reconnaissance mutuelle"@fr . "\u0627\u0644\u0645\u0639\u0627\u064A\u064A\u0631 \u0627\u0644\u0645\u0634\u062A\u0631\u0643\u0629"@ar . "Eastman, C.M."@fr . "10.1145"^^ . . "Pretre-2009"@fr . "Preschern, C"@fr . "Bowles, J.B"@fr . . "CCpart3v21"@fr . "SOGIS"@fr . "Qualit\u00E9 des produits de SSI, les labels fran\u00E7ais"@fr . "Security & privacy IEEE"@fr . . "Sauveron, D."@fr . "\u041E\u0431\u0449\u0438\u0435 \u043A\u0440\u0438\u0442\u0435\u0440\u0438\u0438"@ru . . "Lang, C."@fr . . . "Portail SOGIS"@fr . "Razzazi, M."@fr . "Dadeau, F."@fr . . "Sindre"@fr . . . "Using the Common Criteria to Elicit Security Requirements with Use Cases"@fr . "Guido Wimmel"@fr . . . "Common Criteria Security Evaluation: A Time and Cost Effective Approach"@fr . "Common Criteria meets Realpolitik - Trust, Alliances, and Potential Betrayal"@fr . . . "10.1109"^^ . "507"^^ . . "Evaluation assurance level"@it . . . "Applying the common criteria in systems engineering"@fr . "Introducing Vulnerability Awareness to Common Criteria's Security Targets"@fr . "Razzazi-2006"@fr . "karpati-2011"@fr . "Protection profiles for remailer mixes. Do the new evaluation criteria help?"@fr . "Hearn-2004"@fr . "en"@fr . "NIAP"@fr . "1540"^^ . "187509092"^^ . "CCMRA membres"@fr . "site CCMRA stats"@fr . . "Availability, Reliability and Security , 2011 Sixth International Conference on"@fr . "Jafari, M."@fr . "Los criterios comunes"@es . "Jeju"@fr . . "WJ Lloyd"@fr . "Les crit\u00E8res communs (CC) sont un ensemble de normes (ISO 15408) internationalement reconnu dont l'objectif est d'\u00E9valuer de fa\u00E7on impartiale la s\u00E9curit\u00E9 des syst\u00E8mes et des logiciels informatiques. \u00C9galement d\u00E9nomm\u00E9s Common Criteria, ce r\u00E9f\u00E9rentiel est n\u00E9 d'un partenariat entre le Canada, les \u00C9tats-Unis et l'Europe. Gr\u00E2ce au cadre offert, les utilisateurs de technologies de l\u2019information vont pouvoir utiliser des profils de protection pour sp\u00E9cifier les exigences fonctionnelles de s\u00E9curit\u00E9 attendues et les \u00E9valuateurs pourront v\u00E9rifier que les produits sont bien conformes au niveau d\u2019assurance requis. La mise en \u0153uvre des Crit\u00E8res Communs d\u00E9cid\u00E9e par les signataires d\u2019un accord de reconnaissance mutuelle, facilite grandement l\u2019acceptation des certificats de s\u00E9curit\u00E9 des technologies de l\u2019information \u00E9mis par l\u2019un des pays signataires. Le produit certifi\u00E9 en toute impartialit\u00E9 par une autorit\u00E9 comp\u00E9tente, peut \u00EAtre utilis\u00E9 sans n\u00E9cessiter une \u00E9valuation plus pouss\u00E9e. Bien que pr\u00E9sentant de nombreux avantages, l\u2019application de cette norme s\u2019av\u00E8re co\u00FBteuse, difficilement compr\u00E9hensible pour un non initi\u00E9 et souvent compliqu\u00E9e \u00E0 mettre en \u0153uvre. C\u2019est la raison pour laquelle plusieurs m\u00E9thodes d\u2019utilisation ont vu le jour."@fr . "Washington, DC"@fr . "Secure Software Integration and Reliability Improvement , 2010 Fourth International Conference on"@fr . "Piattini, M."@fr . . "A Common Criteria Based Approach for COTS Component Selection"@fr . . "Ontology-Based Security Problem Definition and Solution for the Common Criteria Compliant Development Process"@fr . "Crit\u00E8res Communs Part 2: Exigences Fonctionnelles de s\u00E9curit\u00E9"@fr . "Lloyd-2004"@fr . "CertifEmis"@fr . "Rannenberg, K."@fr . "Which Trust Can Be Expected of the Common Criteria Certification at End-User Level?"@fr . "Triki, T."@fr . . . "Information Assurance and Security, 2007. IAS 2007. Third International Symposium on"@fr . . "Dacier-1994"@fr . . . "Science Applications International Corporation"@fr . "Brunow"@fr . "Rannenberg-2000"@fr . "Moradi, S."@fr . "Software Testing, Verification and Validation , 2013 IEEE Sixth International Conference on"@fr . "Ware, M.S."@fr . . "Bouquet, F."@fr . . "10"^^ . . "Test Generation and Evaluation from High-Level Properties for Common Criteria Evaluations -- The TASCCC Testing Tool"@fr . . "Common Methodology for Information Technology Security Evaluation"@fr . "Monika Vetterling"@fr . "1"^^ . "Fev"@fr . "Irvine"@fr . "optic301"@fr . "3"^^ . . . . . . "Site officiel \u00AB \u00BB"@fr . "Vienna"@fr . "The common criteria, formal methods and ACL2"@fr . "Ab Manan"@fr . "Dadeau-2013"@fr . "CCMRAC-Proc"@fr . "R Richards"@fr . . "Finest authorizing member of common criteria certification"@fr . . "Hearn, J."@fr . "Common Criteria"@sv . . "Ziv, H."@fr . . . "Fernandez-Medina, E."@fr . "nsa.gov"@fr . "47"^^ . "Keblawi-2006"@fr . "Nguyen, T.D."@fr . "ccmra-mbr"@fr . . . . . "Aligning Security Requirements and Security Assurance Using the Common Criteria"@fr . . . . . "R Mahmod"@fr . "50"^^ . . . . . . . . . "Les crit\u00E8res communs (CC) sont un ensemble de normes (ISO 15408) internationalement reconnu dont l'objectif est d'\u00E9valuer de fa\u00E7on impartiale la s\u00E9curit\u00E9 des syst\u00E8mes et des logiciels informatiques. \u00C9galement d\u00E9nomm\u00E9s Common Criteria, ce r\u00E9f\u00E9rentiel est n\u00E9 d'un partenariat entre le Canada, les \u00C9tats-Unis et l'Europe. Gr\u00E2ce au cadre offert, les utilisateurs de technologies de l\u2019information vont pouvoir utiliser des profils de protection pour sp\u00E9cifier les exigences fonctionnelles de s\u00E9curit\u00E9 attendues et les \u00E9valuateurs pourront v\u00E9rifier que les produits sont bien conformes au niveau d\u2019assurance requis."@fr . . . . "tel.archives-ouvertes.fr"@fr . . "MorphoSmart Optic 301 Public Security Target"@fr .