[1]Cheng J, Goto Y, Morimoto S, et al. A security engineering environment based on ISOIEC standards: Providing standard, formal, and consistent supports for design, development, operation, and maintenance of secure information systems[C] Proc of the 2nd Int Conf on Information Security and Assurance. Los Alamitos, CA: IEEE Computer Society, 2008: 350354[2]Cheng J, Goto Y, Horie D. ISEE: An information security engineering environment[C] Proc of Int Conf on Security and Cryptography. Milan, Italy: INSTICC Press, 2009: 395400[3]Common Criteria Recognition Arrangement. Common Criteria for Information Technology Security Evaluation: Version 3.1 Revision 5[EBOL]. [20170510]. http:www.commoncriteriaportal.org[4]International Organization for Standardization. ISOIEC 15408: Information Technology—Security Techniques—Evaluation Criteria for IT Security[S]. Geneva: International Organization for Standardization, 2009[5]中国国家标准化管理委员会. GBT 18336信息技术—安全技术—信息技术安全性评估准则[S]. 北京: 中国标准出版社, 2015[6]Common Criteria Recognition Arrangement. Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 5[EBOL]. [20170510]. http:www.commoncriteriaportal.org[7]International Organization for Standardization. ISOIEC 18045: Information Technology—Security Techniques—Methodology for IT Security Evaluation[S]. Geneva: International Organization for Standardization, 2008[8]中国国家标准化管理委员会. GBT 30270信息技术 安全技术 信息技术安全性评估方法[S]. 北京: 中国标准出版社, 2013[9]Herrmann D S. Using the Common Criteria for IT Security Evaluation[M]. Washington, DC: CRC Press, 2002[10]Chen H, Bao D, Goto Y, et al. A supporting environment for IT system security evaluation based on ISOIEC 15408 and ISOIEC 18045[G] LNEE 330: Computer Science and Its Applications. Berlin: Springer, 2014: 13591366[11]Chen H, Bao D, Gao H, et al. A security evaluation and certification management database based on ISOIEC standards[C] Proc of the 12th Int Conf on Computational Intelligence and Security. Los Alamitos, CA: IEEE Computer Society, 2016: 249253[12]Bao D, Miura J, Zhang N, et al. Supporting verification and validation of security targets with ISOIEC 15408[C] Proc of the 2nd Int Conf on Mechatronic Sciences, Electric Engineering and Computer. Piscataway, NJ: IEEE, 2013: 26212628