Publikationen und Whitepaper

Die Fachkenntnis unserer Mitarbeiterinnen und Mitarbeiter ist sehr gefragt: Sie gehören internationalen Kommissionen an, halten Vorträge auf Konferenzen und schreiben Bücher und Fachartikel.

Werfen Sie einen Blick auf die Liste von Vorträgen und Veröffentlichungen.

ThemaEvent/MediumAutor/Sprecher
CC Scheme Differences 2013
[ read more]
Whitepapervarious
ISO's Cryptographic Module Work
[ read more]
White PaperFiona Pattinson
Experience with OSPP Evaluations
[ read more]
13th ICCCKrummeck
IT Security Evaluation in China
[ read more]
13th ICCCMao
Understanding Information Entropy
[ read more]
WhitepaperYi Mao
Why and How to Get Cryptographic Modules FIPS Validated
[ read more]
WhitepaperYi Mao
Common Criteria and Packages
[ read more]
WhitepaperPattinson
Evaluating Third-Party Code: How Can It Be Trusted?
[ read more]
12th ICCCCavness
From FIPS 140-2 to CC
[ read more]
12th ICCCMao
Comparative Study Between the Chinese Standards and the Common Criteria
[ read more]
12th ICCCMao, Chen, Liu
Fighting the Bean Counters
[ read more]
12th ICCCKrummeck
An Access Control Model for Applications on Mobile Devices using Common Criteria Certifications
[ read more]
12th ICCCKurth, Huynh
InkaVote Plus Source Code Review
[ read more]
Reportvarious
Escrowed Data and the Digital Envelope
[ read more]
PaperKing Ables
InkaVote Plus Red Team Report
[ read more]
Reportvarious
Untrusted Developers - Code Integrity in a Distributed Development Environment
[ read more]
White PaperCavness, Kurth, Mueller
KVM Security Comparison
[ read more]
White PaperMueller
Secure Network Zones
[ read more]
ISSE 2009Wimmer
An Attack Surface based Approach to Evaluation
[ read more]
10th ICCCKurth
Economical Use of Formal Methods
[ read more]
8th ICCC, RomeYi Mao


Eine vollständige Liste unserer Whitepaper finden Sie auf www.atsec.com.