By Topic

A New Evaluation Strategy Based on Combining CC and SSE-CMM for Security Systems and Products

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Tan Liang ; University of Electronic Science & Technology of China, China; Sichuan Normal University, China ; Zhou Ming-Tian

In this paper, through utilizing the complementarity of CC and SSE-CMM, we map CC to SSE-CMM, and present a new evaluation strategy for security systems and products: CCS_SE-CMM_CS. The following quantitative analysis is shown that CCS_SE-CMM_CS not only can decrease evaluation expensive, time-consuming and arduous, but also can make the results of evaluation based on CCS_SE-CMM_CS have inheritance, that is to say, the evaluation results of TOE have relation with the same engineering team, the forgoing systems developed by analogous engineering process. More important, the new evaluation strategy has a reasonable time frame, and responds well to the market demands of developers and consumers, as well as improve the evaluation efficiency

Published in:

2006 Fifth International Conference on Grid and Cooperative Computing (GCC'06)

Date of Conference:

Oct. 2006