Title
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Abstract
This paper presents a Common Criteria protection profile for high assurance security kernels (HASK-PP) based on the results and experiences of several (international) projects on design and implementation of trustworthy platforms. Our HASK-PP was motivated by the fact that currently no protection profile is available that appropriately covers trusted computing features such as trusted boot, sealing, and trusted channels (secure channels with inherent attestation). In particular, we show how trusted computing features are modeled in the HASK protection profile without depending on any concrete implementation for these features. Instead, this is left to the definition of the security targets of a an IT product which claims conformance to the HASK-PP. Our HASK protection profile was evaluated and certified at evaluation assurance level five (EAL5) by the German Federal Office for Information Security (BSI).
Year
DOI
Venue
2009
10.1007/978-3-642-00587-9_4
TRUST
Keywords
DocType
Volume
high assurance security kernel,high assurance security kernels,common criteria protection profile,protection profile,information security,modeling trusted computing support,hask protection profile,german federal office,evaluation assurance level,it product,concrete implementation,security target,trusted computing
Conference
5471
ISSN
Citations 
PageRank 
0302-9743
4
0.60
References 
Authors
20
5
Name
Order
Citations
PageRank
Hans Löhr129721.35
Ahmad-reza Sadeghi25463334.69
Christian Stüble331829.52
Marion Weber440.60
Marcel Winandy583148.15