Abstract
The ubiquitous environment has been developed since the extension of IT technology. The term ‘Ubiquitous’ is referred firstly by Mark Weiser, which means the user based environment that provides network service ‘any time, anywhere’. In the ubiquitous environment, the computing environment should have the device that recognizes the user and the environment. But there is not a verification process when dealing in sensitive information, and it may cause serious errors or malfunction. In order to complement the problem, members of the CCRA utilized CC(Common Criteria) to build up an assessment system and create a secured ubiquitous environment.
Similar content being viewed by others
References
Canadian Trusted Computer Product Evaluation criteria (CTCPEC). (1993). (Version 3.0) Canadian System Security Centre, Communications Security Establishment, Government of Canada, January.
CMS. (2005). HIPAA security series: Security standards, technical safeguards.
Common Criteria for Information Technology Security Evaluation, (Version 3.0) 2005.07 from http://www.commoncriteriaportal.org/public/expert.
Common Criteria for Information Technology Security Evaluation, (Version 3.1) 2006.09 from http://www.commoncriteriaportal.org/public/expert.
Federal Criteria for Information Technology Security (FC). (1993). Draft (Version 1.0), jointly published by the NIST and NSA, US Government, January.
HIPAA. Summary of the HIPAA privacy rule from http://www.hhs.gov/ocr/hipaa/privrulepd.pdf.
Information Security Evaluation Criteria (ITSEC). (1991). (Version 1.2) Office for Official publications of European commnunities, June.
Paradiso, R., Loriga, G., & Taccini, N. (2004). Wearable Health Care System for Vital Signs Monitoring. Proc. of MEDICON 2004 Conf., Italy.
Trusted Computer System Evaluation Criteria (TCSEC). (1985). US DoD5200.28-STD, December.
von Solms B., Naccache D. (1992) On blind signatures and perfect crimes. Computers and Security 11(6): 581–583
Weiser, M. (1993). Hot topic: Ubiquitous computing. IEEE Computer, October, pp. 71–72.
Wilson, D. H., Long, A. C., & Atkeson, C. (2005). A Context-aware recognition survey for data collection using ubiquitous sensors in the home. In Proceedings of CHI 2005: Late Breaking Results (pp. 1865–1868).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kang, SY., Park, J.H., Khurram Khan, M. et al. Study on the common criteria methodology for secure ubiquitous environment construction. J Intell Manuf 23, 933–939 (2012). https://doi.org/10.1007/s10845-009-0363-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10845-009-0363-x