Ecma International Home
contact us
Ecma Site Map


Technical Report TR/64
Secure Information Processing versus the Context of Product Evaluation

(December 1993)

This paper examines the value of security evaluation criteria and the accompanying evaluation process in a commercial environment. It argues this question must be approached systematically within the context of a full complement of security measures so as to maximize the value from associated investments. It then focuses on the potential benefit specific to evaluations and makes recommendations as to the processes for creating an IT security program with special emphasis on security evaluations.

Annex A is a review of the history and current status of formal evaluation programs. Readers unfamiliar with this topic may wish to read this first.

The following file can be freely downloaded:

File name Size (Bytes) Content
TR-064.pdf 104 420    Acrobat (r) PDF file

Back Back





only search Ecma International

Level A conformance icon, 

          W3C-WAI Web Content Accessibility Guidelines 1.0