Open Source Systems Security Certification

by ; ;
Format: Hardcover
Pub. Date: 2008-11-01
Publisher(s): Springer-Verlag New York Inc
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $149.99

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$35.64
Online:60 Days access
Downloadable:60 Days
$47.52
Online:90 Days access
Downloadable:90 Days
$59.40
Online:120 Days access
Downloadable:120 Days
$71.28
Online:180 Days access
Downloadable:180 Days
$77.22
Online:1825 Days access
Downloadable:Lifetime Access
$118.80
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$77.22*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

"Open Source Systems Security Certification provides an introduction to the notion of the Security Certification, including test-based and model-based approaches to the certification of software products. Several Security Certification standards are presented, including the international standard for the certification of IT products Common Criteria (ISO/IEC 15408) (CC 2006), a certification officially adopted by the governments of 18 nations." "This book discusses Security Certification as a way to foster adoption and deployment of Open Source Software (OSS) in security-sensible markets, such as telecommunications, government and the military. Scientific and technical issues of OSS security certification are highlighted through case studies." "This volume is designed for professionals and companies trying to implement an Open Source Systems (OSS) aware IT governance strategy, and SMEs looking for ways to use OSS in order to enter new security-conscious markets traditionally held by proprietary products. This book is also suitable for researchers and advanced-level students interested in OSS development, deployment and adoption issues."--BOOK JACKET.

Table of Contents

Introductionp. 1
Context and motivationp. 1
Software certificationp. 4
Certification vs. standardizationp. 5
Certification authoritiesp. 5
Software security certificationp. 6
The state of the artp. 8
Changing scenariosp. 9
Certifying Open sourcep. 9
Conclusionsp. 12
Referencesp. 12
Basic Notions on Access Controlp. 15
Introductionp. 15
Access Controlp. 17
Discretionary Access Controlp. 18
Mandatory Access Controlp. 19
Role Based Access Controlp. 24
Conclusionsp. 24
Referencesp. 25
Test based security certificationsp. 27
Basic Notions on Software Testingp. 27
Types of Software Testingp. 30
Automation of Test Activitiesp. 34
Fault Terminologyp. 34
Test Coveragep. 36
Test-based Security Certificationp. 37
The Trusted Computer System Evaluation Criteria (TCSEC) standardp. 39
CTCPECp. 46
ITSECp. 46
The Common Criteria: A General Model for Test-based Certificationp. 47
CC componentsp. 48
Conclusionsp. 59
Referencesp. 60
Formal methods for software verificationp. 63
Introductionp. 63
Formal methods for software verificationp. 65
Model Checkingp. 65
Static Analysisp. 69
Untrusted codep. 73
Security by contractp. 74
Formal Methods for Error Detection in OS C-based Softwarep. 75
Static Analysis for C code verificationp. 76
Model Checking for large-scale C-based Software verificationp. 81
Symbolic approximation for large-scale OS software verificationp. 83
Conclusionp. 86
Referencesp. 86
OSS security certificationp. 89
Open source software (OSS)p. 89
Open Source Licensesp. 90
Specificities of Open Source Developmentp. 93
OSS securityp. 97
OSS certificationp. 99
State of the artp. 100
Security driven OSS developmentp. 104
Security driven OSS development: A case study on Single Sign-Onp. 105
Single Sign-On: Basic Conceptsp. 105
A ST-based definition of trust models and requirements for SSO solutionsp. 107
Requirementsp. 116
A case study: CAS++p. 118
Conclusionsp. 121
Referencesp. 122
Case Study 1: Linux certificationp. 125
The Controlled Access Protection Profile and the SLES8 Security Targetp. 125
SLES8 Overviewp. 126
Target of Evaluation (TOE)p. 127
Security environmentp. 128
Security objectivesp. 129
Security requirementsp. 130
Evaluation processp. 132
Producing the Evidencep. 133
The Linux Test Projectp. 134
Writing a LTP test casep. 135
Evaluation Testsp. 141
Running the LTP test suitep. 141
Test suite mappingp. 142
Automatic Test Selection Example Based on SLES8 Security Functionsp. 146
Evaluation Resultsp. 148
Horizontal and Vertical reuse of SLES8 evaluationp. 149
Across distribution extensionp. 149
SLES8 certification within a composite productp. 151
Conclusionsp. 153
Referencesp. 153
Case Study 2: ICSA and CCHIT Certificationsp. 155
Introductionp. 155
ICSA Dynamic Certification Frameworkp. 157
A closer look to ICSA certificationp. 158
Certification processp. 158
A case study: the ICSA certification of the Endian firewallp. 159
Endian Test Planp. 161
Hardware configurationp. 161
Software configurationp. 161
Features to testp. 161
Testing toolsp. 163
Testingp. 164
Configurationp. 164
Loggingp. 165
Administrationp. 166
Security testingp. 166
The CCHIT certificationp. 168
The CCHIT certification processp. 170
Conclusionsp. 170
Referencesp. 171
The role of virtual testing labsp. 173
Introductionp. 173
An Overview of Virtualization Internalsp. 176
Virtualization Environmentsp. 177
Comparing technologiesp. 179
Virtual Testing Labsp. 180
The Open Virtual Testing Labp. 180
Xen Overviewp. 181
OVL key aspectsp. 181
Hardware and Software Requirementsp. 182
OVL Administration Interfacep. 184
Using OVL to perform LTP testsp. 184
Conclusionsp. 186
Referencesp. 186
Long-term OSS security certifications: An Outlookp. 187
Introductionp. 187
Long-term Certificationsp. 189
Long-lived systemsp. 189
Long-term certificatesp. 190
On-demand certificate checkingp. 192
The certificate composition problemp. 194
Conclusionsp. 195
Referencesp. 196
An example of a grep-based search/match phasep. 199
Indexp. 201
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.