44. منابع
1. Algirdas Avizienis, Fundamental Concepts of Computer System Dependability, ARP/IEEE-RAS Workshop on Robot Dependability,2001.
2. Common Criteria Familiarization (slides), NIST.
3. Common Criteria for IT Security Evaluation, Part 1, 2 & 3, 2012. http://www.commoncriteriaportal.org/cc/
4. Common Criteria User Guides, 1999. https://www.niap-ccevs.org/Documents_and_Guidance/cc_docs.cfm
5. Common Criteria Evaluation methodology, http://www.commoncriteriaportal.org/cc/
6. FAA System Security Testing and Evaluation, MITRE TECHNICAL REPORT,2003.
7. Seungjoo Kim, security analysis and evaluation lab slides, Korean university. 2012.
8. Managing IT security using common criteria, ISACA –CETIC Meeting, 2007.
9. Common Criteria and Protection Profiles: How to Evaluate Information, SANS Institute, 2003.
10. Applying the Common Criteria to the Certification & Accreditation of Department of Defense Unclassified Information Technology
Systems, SANS Institute, 2003.
11. Trusted Computer System Evaluation Criteria(DoD5200.28), Department Of Defense, 1985.
12. Common Criteria IT Security Evaluation & the National Information Assurance Partnership Facts Sheet.
13. FIPS140-2: Security Requirements For Cryptographic Modules, National Institute of Standards and Technology,2001.
14. NIST Special Publication 800-53.r4: Security and Privacy Controls for Federal Information Systems and Organizations, 2013.
15. NIST Special Publication 800-53A.r4:Assessing Security and Privacy Controls for Federal Information Systems and Organizations, 2014.
16. NIST Special Publication 800-115: Technical Guide to Information Security Testing and Assessment, 2008.
44