 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
¨ |
Role
of the Security Function Testing
|
|
|
¨ |
Aspects
of the System Security Realization
|
|
|
– |
ATE_COV:
The High Level (Security) Design
|
|
|
|
– |
ATE_DPT:
The Low Level (Security) Design
|
|
|
|
– |
ATE_FUN:
TSF Internals
|
|
|
|
– |
ATE_IND:
The Implementation Representation
|
|
|
¨ |
Security
Function Testing In EROS
|
|