Skip to main content
  • 29 Accesses

Abstract

Die IT-Sicherheitskriterien der ZSI (das ‘Grüne Buch’) sind am 1.6.89 im Verlag des Bundesanzeigers erschienen. Zwischenzeitlich ist ebenfalls eine englische Fassung erschienen. Die Kriterien zur Beurteilung der Sicherheit und Vertrauenswürdigkeit von IT-Systemen haben weltweit Anerkennung gefunden. Es werden die Motivationen, Strategien und Ziele, die mit der Herausgabe dieser Kriterien verbunden sind, erläutert.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur-Referenzen

USA

  1. Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, Department of Defense(1985)

    Google Scholar 

  2. Passwort Management Guideline, CSC-STD-002-85, National Computer Security Center (1985)

    Google Scholar 

  3. Computer Security Requirements: “Guidance for applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments”,CSC-STD-003-85

    Google Scholar 

  4. Technical Rationale behind CSC-STD-003:“Guidance for applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environnent”,CSC-STD-004-85 [U5] A Guide to understanding Audit in Trusted Systems, NCSC-TG-001/V-2 (1988)

    Google Scholar 

  5. A Guide to understanding Discretionary Access Control in Trusted Systems, NCSC-TG-003/V-1 (1987)

    Google Scholar 

  6. Glossary of Computer Security Terms, NCSC-TG-004/V-1 (1988)

    Google Scholar 

  7. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-005/V-1 (1987)

    Google Scholar 

  8. A Guide to understanding Configuration Management in Trusted Systems, NCSC-TG-006/V-1 (1988)

    Google Scholar 

  9. A Guide to understanding Design Documentation in Trusted Systems, NCSC-TG-007/V-1 (1988)

    Google Scholar 

  10. A Guide to understanding Trusted Distribution in Trusted Systems, NCSC-TG-008/V-1 (1988)

    Google Scholar 

  11. Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-009/V-1 (1988)

    Google Scholar 

  12. Guidelines for Formal Verification Systems, NCSC-TG-014/V-1 (1989)

    Google Scholar 

  13. COMPUSECese Computer Security Glossary, NCSC-WA-001-85 (1985)

    Google Scholar 

  14. Personal Computer Security Considerations, NCSC-WA-002-85 (1985)

    Google Scholar 

GB

  1. Glossary of Computer Security Terms, CESG Computer Security Memorandum No. 1 Issue 2. 0 (1989)

    Google Scholar 

  2. UK Systems Security Confidence Levels, CESG Computer Security Memorandum No. 3: Issue 1. 1 (1989)

    Google Scholar 

  3. CESG Development Programme: TNET, CESG Computer Security Memorandum No. 4 (1989)

    Google Scholar 

  4. Evaluations Levels Manual, Department of Trade and Industry (DTI) Commercial Computer Security Centre, Version 3. 0 (Draft) (1989)

    Google Scholar 

  5. Security Functionality Manual, DTI Commercial Computer Security Centre, Version 3. 0 (Draft) (1989)

    Google Scholar 

  6. Overview of Documentation, DTI,Version 3. 0 (1989)

    Google Scholar 

  7. Glossary, DTI, Version 3. 0 (1989)

    Google Scholar 

  8. Users Code of Practice, DTI, Version 13. 0, (1989)

    Google Scholar 

  9. Evaluation and Certification Manual, DTI, Version 3. 0, (1989)

    Google Scholar 

  10. Vendors Code of Practice, DTI, Version 3. 0, (1989)

    Google Scholar 

F

  • F1] Glossaire Anglais-Francais relatif a la Securite des Systemes d’Information, Version 2 (Draft) (1988)

    Google Scholar 

Kanada

  1. Canadian Trusted Computer Product Evaluation Criteria, Version 1.0 ( Draft ), Systems Security Centre- Communications Security Establishment- Government of Canada (1989)

    Google Scholar 

NATO

  1. NATO Trusted Computer System Evaluation Criteria, NATO AC/35-D/1027(1987)

    Google Scholar 

Download references

Authors

Editor information

Heiko Lippold Paul Schmitz

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig

About this chapter

Cite this chapter

Kersten, H. (1990). Pro: Die IT-Sicherheitskriterien der ZSI. In: Lippold, H., Schmitz, P. (eds) Sicherheit in netzgestützten Informationssystemen. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-83581-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-83581-9_3

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05105-1

  • Online ISBN: 978-3-322-83581-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics