Skip to main content
Log in

Study on the common criteria methodology for secure ubiquitous environment construction

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

The ubiquitous environment has been developed since the extension of IT technology. The term ‘Ubiquitous’ is referred firstly by Mark Weiser, which means the user based environment that provides network service ‘any time, anywhere’. In the ubiquitous environment, the computing environment should have the device that recognizes the user and the environment. But there is not a verification process when dealing in sensitive information, and it may cause serious errors or malfunction. In order to complement the problem, members of the CCRA utilized CC(Common Criteria) to build up an assessment system and create a secured ubiquitous environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Canadian Trusted Computer Product Evaluation criteria (CTCPEC). (1993). (Version 3.0) Canadian System Security Centre, Communications Security Establishment, Government of Canada, January.

  • CMS. (2005). HIPAA security series: Security standards, technical safeguards.

  • Common Criteria for Information Technology Security Evaluation, (Version 3.0) 2005.07 from http://www.commoncriteriaportal.org/public/expert.

  • Common Criteria for Information Technology Security Evaluation, (Version 3.1) 2006.09 from http://www.commoncriteriaportal.org/public/expert.

  • Federal Criteria for Information Technology Security (FC). (1993). Draft (Version 1.0), jointly published by the NIST and NSA, US Government, January.

  • HIPAA. Summary of the HIPAA privacy rule from http://www.hhs.gov/ocr/hipaa/privrulepd.pdf.

  • Information Security Evaluation Criteria (ITSEC). (1991). (Version 1.2) Office for Official publications of European commnunities, June.

  • Paradiso, R., Loriga, G., & Taccini, N. (2004). Wearable Health Care System for Vital Signs Monitoring. Proc. of MEDICON 2004 Conf., Italy.

  • Trusted Computer System Evaluation Criteria (TCSEC). (1985). US DoD5200.28-STD, December.

  • von Solms B., Naccache D. (1992) On blind signatures and perfect crimes. Computers and Security 11(6): 581–583

    Article  Google Scholar 

  • Weiser, M. (1993). Hot topic: Ubiquitous computing. IEEE Computer, October, pp. 71–72.

  • Wilson, D. H., Long, A. C., & Atkeson, C. (2005). A Context-aware recognition survey for data collection using ubiquitous sensors in the home. In Proceedings of CHI 2005: Late Breaking Results (pp. 1865–1868).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin Kwak.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kang, SY., Park, J.H., Khurram Khan, M. et al. Study on the common criteria methodology for secure ubiquitous environment construction. J Intell Manuf 23, 933–939 (2012). https://doi.org/10.1007/s10845-009-0363-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-009-0363-x

Keywords

Navigation