 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
¨ |
System
Security Realization Families Seem
|
|
to
Require Top-Down Development
|
|
|
|
– |
NOT
SO – they require that the realization be
|
|
|
PRESENTED
as a series of refinements
|
|
|
|
– |
There
are NO requirements that the TOE be
|
|
|
developed
in a strict top-down fashion
|
|
|
¨ |
System
Security Realization Families Are
|
|
|
Specified
To Facilitate Evaluation
|
|
|
|
– |
Challenge
is to develop TOE so that all
|
|
|
required
information is captured
|
|