Protection Profiles for Discretionary Information Flow Control
The protection of information flow is prevalently implemented with techniques like access control functions, encryption procedures or firewalls. Additionally, the transmission of information through public networks may be secured by Virtual Private Networks (VPNs) or by using a Public Key Infrastructure (PKI).
Admittedly, many IT users hesitate to use such security techniques methods because of the efforts concerning installation, administration and operation of those products. As a consequence, information, that needs to be protected, flows unprotected through public networks.
The German Information Security Agency (Bundesamt für Sicherheit in der Informationstechnik - BSI) commissioned the German Research Center for Artificial Intelligence (Deutsches Forschungszentrum für Künstliche Intelligenz - DFKI) to create two Common Criteria Protection Profiles for discretionary information flow security of IT systems....
Partners
Bundesamt für Sicherheit in der Informationstechnik Deutsche Forschungszentrum für Künstliche Intelligenz GmbH T-Systems ISS GmbH Der Bundesbeauftragte für den Datenschutz Der Bayerische Landesbeauftragte für den Datenschutz SuSE LINUX AG IT@work Trusted Solutions GmbH Utimaco Safeware AG Datapol GmbH