The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well.


steve_thomp...@stercomm.com (Thompson, Steve) writes:
> Dr. Wang is no longer with us. And the company, WANG, was taken over by
> another company and they basically dropped the hardware. Some years ago
> I was bidding on migrating WANG/VS based entities to z/OS. I understand
> that there are still a few holdouts in the Government arena.

re:
http://www.garlic.com/~lynn/2009n.html#10 33 Years In IT/Security/Audit

there aren't a lot of stuff that had gotten B3 evaluation 
... following claims that wang was the only one ...
http://www.dynamoo.com/orange/summary.htm

in the transition from orange book to common criteria, i had started
doing merged security taxonomy & glossary
http://www.garlic.com/~lynn/index.html#glosnote

and some from common criteria was criticizing me for having both orange
book and common criteria definitions in the same glossary. i countered
with common criteria was to have protection profiles for specific
environments that weren't otherwise capable of getting reasonable orange
book certification.

this is recent post referencing getting EAL4+ evaluation for a
semi-custom chip
http://www.garlic.com/~lynn/2009n.html#7

my complaint was that some others, using similar flavor of the chip,
being able to get a higher evaluation. they were able to use "smart card
protection profile" ... which has majority of the stuff about being able
to load applications on the chip (doesn't actually evaluate what gets
loaded to make the chip useful ... just evaluates the chip and the
loading processes ... not what is loaded).

my semi-custom chip had whole bunch of the applications in silicon ...
including crypto. since it was part of the silicon chip ... it had to be
evaluated as part of the basic chip (the other way avoided having to
evaluate a useful deployed chip with actual application). the problem
was that there wasn't profile for the crypto for higher level
evaluation. I would still claim that my base EAL4+ chip was actually
more secure chip than those with higher evaluations ... since I had done
with the applications and they evaluated w/o actual applications.

not long ago there was presentation on 65 system EAL evaluations ...
that claimed 63 had undisclosed/unpublished deviations (i.e. they had
unpublished changes to the protection profile being used). In theory,
the purpose behind all this is to have apple-to-apple (trusted
operation) comparison ... but with majority having various undisclosed
deviations ... it is hard to see how they aren't apple-to-oranges.

It turns out I was involved in doing some amount of trusted computing
stuff as undergraduate in the 60s ... even if I didn't know it was
called that at the time ... and I didn't learn about these guys until
much later
http://www.nsa.gov/research/selinux/list-archive/0409/8362.shtml

-- 
40+yrs virtualization experience (since Jan68), online at home since Mar1970

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to