skip to main content
article

Secure systems development based on the common criteria: the PalME project

Published:01 November 2002Publication History
Skip Abstract Section

Abstract

Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements catalogue for the evaluation of security critical systems. Using the CC, a large number of security requirements on the system itself and on the system development can be defined. However, the CC does not give methodological support.In this paper, we show how integrate security aspects into the software engineering process. The activities and documents from the Common Criteria are tightly intertwined with the system development, which improves the quality of the developed system and reduces the additional cost and effort due to high security requirements. For modelling and verification of critical parts of the system, we use formal description techniques and model checking (supported by the graphical CASE tool AUTOFOCUS), which increases both the understanding of the system specification and the system's reliability. We demonstrate our ideas by means of a case-study, the PalME project--an electronic purse application for Palm handhelds.

References

  1. R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989.]]Google ScholarGoogle ScholarCross RefCross Ref
  3. Common criteria for information technology security evaluation version 2.1. Technical report, 1999. URL: http://www.commoncriteria.org/docs/index, html.]]Google ScholarGoogle Scholar
  4. Common criteria for information technology security evaluation supplement: Vulnerability analysis and penetration testing. Technical report, 2002. URL: http://www.commoncriteria.org/review_docs/index.html.]]Google ScholarGoogle Scholar
  5. D. F. D'Souza and A. C. Wills. Objects, Components and Frameworks with UML; the Catalysis Approach. Addison Wesley Object Technology Series, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Gnatz, F. Marschall, G. Popp, A. Rausch, and W. Schwerin. Towards a living software development process based on process patterns. In V. Ambriola, editor, Proceedings of the Eight European Workshop on Software Process Technology 2001, Lecture Notes in Computer Science 2077, pages 182-202. Springer, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. Huber, S. Molterer, A. Rausch, B. Schätz, M. Sihling, and O. Slotosch. Tool supported Specification and Simulation of Distributed Systems. In International Symposium on Software Engineering for Parallel and Distributed Systems, pages 155-164, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. F. Huber, S. Molterer, B. Schätz, O. Slotosch, and A. Vilbig. Traffic Lights -- An AutoFocus Case Study. In 1998 International Conference on Application of Concurrency to System Design, pages 282-294. IEEE Computer Society, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. IABG. V-Modell 97, 1999. URL: http://www.v-modell.iabg.de/ (in German).]]Google ScholarGoogle Scholar
  10. ITSEC. Information Technology Security Evaluation Criteria--Harmonised Criteria of France, Germany, the Netherlands, the United Kingdom, May 1990. Version 1.]]Google ScholarGoogle Scholar
  11. J. Jürjens and G. Wimmel. Security modelling for electronic commerce: The Common Electronic Purse Specifications. In 1st IFIP Conference on E-Commerce, E-Business and E-Government. Kluwer, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. Lowe. Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR. In Margaria and Steffen, editors, TACAS, volume 1055 of Lecture Notes on Computer Science, pages 147-166. Springer, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. A. Mahony, M. Peirce, and H. Tewari. Electronic Payment Systems. Artech House Publishers, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K. L. McMillan. Symbolic Model Checking. Kluwer Academic Publishers, Boston, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. PalME-Team. PalME secure Palm-based Money Exchange -- Project Homepage, 2001. URL: http://www4.in.tum.de/~palme/ (in German).]]Google ScholarGoogle Scholar
  16. L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.]] Google ScholarGoogle ScholarCross RefCross Ref
  17. J. Philipps and O. Slotosch. The Quest for Correct Systems: Model Checking of Diagramms and Datatypes. In Asia Pacific Software Engineering Conference 1999, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. O. Slotosch. Quest: Overview over the Project. In D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors, Applied Formal Methods - FM-Trends 98, pages 346-350. Springer LNCS 1641, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. I. Somerville. Software Engineering. Addison Wesley, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. W. Swartout and R. Balzer. On the Inevitable Interleaving of Specification and Implementation. Communications of the ACM, 25(7), 1982.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Vetterling. Security Engineering nach den Common Criteria -- eine Fallstudie. Master's thesis, Technische Universität München, Aug. 2001.]]Google ScholarGoogle Scholar
  22. G. Wimmel, H. Lötzbeyer, A. Pretschner, and O. Slotosch. Specification Based Test Sequence Generation with Propositional Logic. Journal on Software Testing Verification and Reliability, 10, 2000.]]Google ScholarGoogle Scholar
  23. G. Wimmel and A. Wißpeintner. Extended description techniques for security engineering. In 16th International Conference on Information Security (IFIP/SEC 2001). Kluwer, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure systems development based on the common criteria: the PalME project

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader