ARTICLES AND WHITE PAPERS
atsec employees’ expertise is in demand: we are members of international boards, speakers on conferences, and authors of books and articles.
Here are some examples of our reports and publications.
Topic | Event/ Medium |
Author/ Speaker |
---|---|---|
cPP for Network Devices v1.0 [ ![]() |
Presentation | Scott Chapman |
CC Scheme Differences 2013 [ ![]() |
White Paper | Pattinson, Hake, Krummeck, Persson |
ISO’s Cryptographic Module Work [ ![]() |
White Paper | Fiona Pattinson |
Experience with OSPP Evaluations [ ![]() |
13th ICCC | Gerald Krummeck |
IT Security Evaluation in China [ ![]() |
13th ICCC | Yi Mao |
Understanding Information Entropy [ ![]() |
White Paper | Yi Mao |
Why and How to Get Cryptographic Modules FIPS Validated [ ![]() |
White Paper | Yi Mao |
atsec Newsletter China 04/2012 [ ![]() |
Newsletter | Various |
atsec Newsletter USA 04/2012 [ ![]() |
Newsletter | Various |
Common Criteria and Packages [ ![]() |
White Paper | Fiona Pattinson |
atsec Newsletter Germany 02/2011 [ ![]() |
Newsletter | Various |
FRITSA: Do You Understand How all of your IT Security Assurance Efforts fit Together? [ ![]() |
ISSA Austin | Fiona Pattinson |
atsec Newsletter China 12/2011 [ ![]() |
Newsletter | Various |
From FIPS 140-2 to CC [ ![]() |
12th ICCC | Yi Mao |
Comparative Study Between the Chinese Standards and the Common Criteria [ ![]() |
12th ICCC | Mao, Chen, Liu |
Fighting the Bean Counters [ ![]() |
12th ICCC | Gerald Krummeck |
An Access Control Model for Applications on Mobile Devices using Common Criteria Certifications [ ![]() |
12th ICCC | Kurth, Huynh |
atsec Newsletter USA 10/2011 [ ![]() |
Newsletter | Various |
atsec Newsletter China 09/2011 [ ![]() |
Newsletter | Various |
InkaVote Plus Source Code Review [ ![]() |
Report | Various |
Escrowed Data and the Digital Envelope [ ![]() |
Paper | King Ables |
atsec Newsletter Germany 08/2011 [ ![]() |
Newsletter | Various |
atsec Newsletter China 06/2011 [ ![]() |
Newsletter | Various |
atsec Newsletter USA 07/2011 [ ![]() |
Newsletter | Various |
InkaVote Plus Red Team Report [ ![]() |
Report | Various |
atsec Newsletter Germany 04/2011 [ ![]() |
Newsletter | Various |
Penetration Testing as an Auditing Tool [ ![]() |
ISACA Austin Meeting | Jeremy Powell |
Payment Card Industry Assessments & Privacy [ ![]() |
IAPP Austin | Fiona Pattinson |
atsec Newsletter USA 02/2011 [ ![]() |
Newsletter | Various |
atsec Newsletter Germany 01/2011 [ ![]() |
Newsletter | Various |
atsec Newsletter USA 12/2010 [ ![]() |
Newsletter | Various |
atsec Newsletter China 11/2010 [ ![]() |
Newsletter | Various |
Migrating to OSPP [ ![]() |
11th ICCC Conference | Krummeck, Penny, Robinson |
Improving the Flexibility and Applicability of Protection Profiles [ ![]() |
11th ICCC Conference | Helmut Kurth |
atsec Newsletter Germany 09/2010 [ ![]() |
Newsletter | Various |
Untrusted Developers – Code Integrity in a Distributed Development Environment [ ![]() |
White Paper | Cavness, Kurth, Mueller |
Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? [ ![]() |
SHARE Conference | Fiona Pattinson |
Security Assurance: Contrasting FISMA and ISO/IEC 27001 [ ![]() |
White Paper | Fiona Pattinson |
atsec Newsletter USA 02/2010 [ ![]() |
Newsletter | Various |
Payment Card Industry Compliance For Large Computing Systems [ ![]() |
White Paper | Various |
atsec Newsletter Germany 12/2009 [ ![]() |
Newsletter | Various |
KVM Security Comparison [ ![]() |
White Paper | Stephan Mueller |
Secure Network Zones [ ![]() |
ISSE 2009 | Peter Wimmer |
Evidence based Evaluations Chances and Challenges [ ![]() |
10th ICCC | Helmut Kurth |
Trusting Virtual Trust [ ![]() |
10th ICCC | Jeremy Powell |
Taking White Hats to the Laundry: How to Strengthen Testing in CC [ ![]() |
10th ICCC | Apostol Vassilev |
An Attack Surface based Approach to Evaluation [ ![]() |
10th ICCC | Helmut Kurth |
atsec Newsletter Germany 08/2009 [ ![]() |
Newsletter | Various |
Assurance in Implementation Correctness of Cryptographic Algorithms Gained Through the NIST Cryptographic Algorithm Validation Program [ ![]() |
White Paper | Fiona Pattinson |
Heiter bis Wolkig [ ![]() |
iX – 5/2009 | Stephan Mueller |
Common Criteria: National Validation Scheme Differences: CCEVS, CSEC and BSI [ ![]() |
White Paper | Pattinson, Hake, Krummeck, Persson |
Introducing Assurance Measures for Security Target [ ![]() |
9th ICCC, Korea | Yi Mao |
Comparison of CC Functionality & FISMA 800-53 Controls [ ![]() |
White Paper | Fiona Pattinson |
Operating System Evaluations – What security functionality is expected [ ![]() |
8th ICCC, Rome | Kurth, Farrel (IBM) |
How To Eat A Mammoth [ ![]() |
8th ICCC, Rome | Gerald Krummeck |
Economical Use of Formal Methods [ ![]() |
8th ICCC, Rome | Yi Mao |
Secure System Design [ ![]() |
8th ICCC, Rome | Fiona Pattinson |
CC in the Real World [ ![]() |
8th ICCC, Rome | Fiona Pattinson |
CC quick reference [ ![]() |
atsec document | Fiona Pattinson |
Dumm gelaufen – Stromausfall am Wochenende [ ![]() |
Behoerdenspiegel, Germany | atsec GmbH |
A quick quide to the Linux evaluations [ ![]() |
White Paper | Mueller, Pattinson |
Certifying Information Security Management Systems [ ![]() |
White Paper | Fiona Pattinson |
Wireless Intrusion Detection und Prevention Systeme – Ein Überblick [ ![]() |
BSI Kongress 2007, Bonn | Matthias Hofherr |
Wireless Intrusion detection [ ![]() |
14. DFN-CERT Workshop “Sicherheit in vernetzten Systemen” | Matthias Hofherr |
How to Write Site Security Targets [ ![]() |
7th ICCC Conference, Lanzarote | Gerald Krummeck |
Applying the Draft CC Version 3.0 to Linux – Experience from a Trial Evaluation [ ![]() |
7th ICCC Conference, Lanzarote | Helmut Kurth |
Information Security Assurance – Why there’s no single solution [ ![]() |
Information Storage + Security Journal | Fiona Pattinson |