Finest authorizing member of common criteria certification

Globalization had changed the world landscape into borderless world without limits to sea, land and air space. The development of IT products and services need evaluation and certification. This paper discusses some security and trust issues in Common Criteria in evaluation and certification of IT products and services. Our intention is to help manufacturer in choosing a finest authorizing member of CC certification for IT products and services in varying situations amongst countries participating in the CC certification, be it friendly, neutral or war. The consequence is to help reduce cost to trade these IT products and related services in global market. The ultimate impact is to enable us do more business and market our products in other countries if we have wider acceptability of the CC certification.

[1]  S Setapa,et al.  Trusted computing based microkernel , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.

[2]  Zubair Ahmad Khattak,et al.  Security, trust and privacy: a new direction for pervasive computing , 2011 .

[3]  Jan Kallberg,et al.  The Common Criteria Meets Realpolitik: Trust, Alliances, and Potential Betrayal , 2012, IEEE Security & Privacy.

[4]  Vienna Lecture,et al.  ON THE EUROPEAN UNION , 2010 .

[5]  Paul Taylor,et al.  From the United Nation , 1948, Social Service Review.

[6]  Garrel Pottinger,et al.  Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military , 1997, IEEE Ann. Hist. Comput..

[7]  Richard W. Van Alstyne The North Atlantic Treaty , 2022, George F. Kennan and the Making of American Foreign Policy, 1947-1950.

[8]  Jamalul-lail Ab Manan,et al.  An Approach to Establish Trusted Application , 2010, 2010 Second International Conference on Network Applications, Protocols and Services.

[9]  Jim Hearn Does the common criteria paradigm have a future? [security and privacy] , 2004, IEEE Security & Privacy Magazine.

[10]  Mohd Anuar Mat Isa,et al.  ESTABLISHING TRUSTED PROCESS IN TRUSTED COMPUTING PLATFORM , 2010 .

[11]  Yusnani Mohd Yussoff,et al.  Root of trust for trusted node based-on ARM11 platform , 2011, The 17th Asia Pacific Conference on Communications.

[12]  Christof Heyns,et al.  The African Union , 2003 .

[13]  M. Razzazi,et al.  Common Criteria Security Evaluation: A Time and Cost Effective Approach , 2006, 2006 2nd International Conference on Information & Communication Technologies.

[14]  Steven B. Lipner,et al.  Trusted Computer System Evaluation Criteria ( Orange Book ) December , 2001 .