 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
¨ |
Role
of the System Security Realization
|
|
|
¨ |
Aspects
of the System Security Realization
|
|
|
|
– |
ADV_HLD:
The High Level (Security) Design
|
|
|
|
– |
ADV_LLD:
The Low Level (Security) Design
|
|
|
|
– |
ADV_INT:
TSF Internals
|
|
|
|
– |
ADV_IMP:
The Implementation Representation
|
|
|
|
– |
ADV_RCR:
Representation Correspondence
|
|
|
¨ |
Techniques
for Developing the System Security
|
|
Realization
|
|