<--- Back to Details
First PageDocument Content
Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Common Criteria / Protection Profile / Evaluation Assurance Level / Security Target / Trusted Computer System Evaluation Criteria / Penetration test / Validation / Evaluation / Computer security / National Information Assurance Partnership
Date: 2007-09-26 01:00:00
Common Criteria Evaluation and Validation Scheme
Common Criteria Testing Laboratory
Common Criteria
Protection Profile
Evaluation Assurance Level
Security Target
Trusted Computer System Evaluation Criteria
Penetration test
Validation
Evaluation
Computer security
National Information Assurance Partnership

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 264,76 KB

Share Document on Facebook

Similar Documents

Logic / Mathematical logic / Mathematics / Boolean algebra / Complexity classes / Metalogic / Model theory / True quantified Boolean formula / Satisfiability / FO / PSPACE-complete / Well-formed formula

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

DocID: 1xW1P - View Document

Design of experiments / Causal inference / Evaluation / Observational study / Methodology / Knowledge / Impact assessment / Confounding / Experiment / Quasi-experiment / Program evaluation / Impact evaluation

A2J Evaluation and Research Options Process Evaluation Formative Assessment

DocID: 1xVZa - View Document

Education / Learning / Educational psychology / Course evaluation / Formative assessment / Educational assessment / Peer feedback / Educational technology / Active learning / Classroom Assessment Techniques

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

DocID: 1xVYB - View Document

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

DocID: 1xVWY - View Document

Cryptography / Stream ciphers / Block cipher / ESTREAM / DICING / WG

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document