Common Criteria and Protection Profiles: How to Evaluate Information

The purpose of this paper is to discuss the standards of Common Criteria and the security framework provided by the Common Criteria. In addition, this paper will review the background and applicability of Common Criteria Protection Profiles established to evaluate specific Information Technology...
Kathryn Wallace
June 3, 2003

All papers are copyrighted. No re-posting of papers is permitted