Modify CC, CC_tests and CC_terms

All terms and definition are now in CC_terms
This commit is contained in:
Pierre Derathe 2023-01-25 14:47:03 +01:00 committed by Pierre Derathe
parent fab3b3394e
commit fcae04fd83
2 changed files with 4 additions and 462 deletions

View File

@ -12,474 +12,14 @@ identifies:
(*<<*)
theory Common_Criteria
imports "Isabelle_DOF.technical_report"
imports "Isabelle_DOF.Common_Criteria_terms"
begin
text\<open>We re-use the class \<^typ>\<open>math_content\<close>, which provides also a framework for
semi-formal "math-alike" terminology, which we re-use by this definition.\<close>
doc_class semi_formal_content = math_content +
status :: status <= "semiformal"
mcc :: math_content_class
type_synonym sfc = semi_formal_content
doc_class cc_term = semi_formal_content +
mcc :: math_content_class <= "terminology"
type_synonym common_criteria_term = cc_term
text\<open> in the following, all \<^theory_text>\<open>Definition*\<close> statements are interpreted as
\<^doc_class>\<open>cc_term\<close>s, i.e. semi-formal teminological definitions.\<close>
declare[[ Definition_default_class="cc_term"]]
text\<open> Excerpt of the BE EN 50128:2011, page 22. \<close>
section\<open>Terms and Definitions\<close>
declare_reference*[evaluator]
declare_reference*[developer]
Definition*[action]
\<open>documented activity of the @{cc_term (unchecked) \<open>evaluator\<close>}
or @{cc_term (unchecked) \<open>developer\<close>}\<close>
declare_reference*[entity]
declare_reference*[TSF]
Definition*[admministrator]
\<open> @{cc_term (unchecked) \<open>entity\<close>} that has a level of trust with respect to
all policies implemented by the @{cc_term (unchecked) \<open>TSF\<close>}\<close>
Definition*[API, short_name="''application programming interface''"]
\<open>\<close>
declare_reference*[threat_agent]
declare_reference*[asset]
Definition*[adverse_action]
\<open> \<^cc_term>\<open>action\<close> performed by a @{cc_term (unchecked) \<open>threat_agent\<close>}
on an @{cc_term (unchecked) \<open>asset\<close>}\<close>
declare_reference*[TOE]
Definition*[asset]
\<open> @{cc_term (unchecked) \<open>entity\<close>} that the owner of
the @{cc_term (unchecked) \<open>TOE\<close>} presumably places value on\<close>
Definition*[assignement]
\<open>specification of an identified parameter in a functional or assurance component\<close>
declare_reference*[SFR]
Definition*[assurance]
\<open>grounds for confidence that a @{cc_term (unchecked) \<open>TOE\<close>} meets
the security functional requirements @{cc_term (unchecked) \<open>SFR\<close>}s \<close>
declare_reference*[SAR]
Definition*[AP, short_name="''assurance package''"]
\<open>named set of @{cc_term (unchecked) \<open>SAR\<close>}s\<close>
Definition*[attack_potential]
\<open>measure of the effort needed to exploit a vulnerability in a @{cc_term (unchecked) \<open>TOE\<close>} \<close>
Definition*[attack_surface]
\<open>set of logical or physical interfaces to a target, consisting of points
through which access to the target and its functions may be attempted\<close>
Definition*[augmentation]
\<open>addition of one or more requirements to a package\<close>
Definition*[autorized_user]
\<open> @{cc_term (unchecked) \<open>entity\<close>} who may, in accordance with the @{cc_term (unchecked) \<open>SFR\<close>}s,
perform an operation on the @{cc_term (unchecked) \<open>TOE\<close>}\<close>
declare_reference*[independent_entity]
declare_reference*[dependent_component]
Definition*[base_component]
\<open> @{cc_term (unchecked) \<open>independent_entity\<close>} in a multi-component product that provides
services and resources to one or more @{cc_term (unchecked) \<open>dependent_component\<close>}(s)\<close>
declare_reference*[PP]
declare_reference*[PP_module]
declare_reference*[PP_module_base]
declare_reference*[PP_config]
Definition*[base_PP, short_name="''base Protection Profile''"]
\<open> @{cc_term (unchecked) \<open>PP\<close>} specified in a @{cc_term (unchecked) \<open>PP_module\<close>},
as part of that @{cc_term (unchecked) \<open>PP_module\<close>}s @{cc_term (unchecked) \<open>PP_module_base\<close>},
used as a basis to build a @{cc_term (unchecked) \<open>PP_config\<close>}\<close>
Definition*[base_PP_module, short_name="''base PP-Module''"]
\<open>@{cc_term (unchecked) \<open>PP_module\<close>} specified in a different @{cc_term (unchecked) \<open>PP_module\<close>},
as part of that @{cc_term (unchecked) \<open>PP_module\<close>}s @{cc_term (unchecked) \<open>PP_module_base\<close>},
used as a basis to build a @{cc_term (unchecked) \<open>PP_config\<close>}\<close>
Definition*[base_TOE, short_name="''base target of evaluation''"]
\<open>@{cc_term (unchecked) \<open>base_component\<close>} which is itself the subject of an evaluation\<close>
Definition*[class_cc, short_name="''class''"]
\<open>〈taxonomy〉 set of families that share a common focus\<close>
Definition*[CD, short_name="''compact disk''"]
\<open>\<close>
Definition*[component]
\<open>〈taxonomy〉 smallest selectable set of elements on which requirements may be based OU
<composition> @{cc_term (unchecked) \<open>entity\<close>} which provides resources and services in a product\<close>
declare_reference*[composed_TOE]
Definition*[component_TOE, short_name="''component target of evaluation''"]
\<open>(evaluated) @{cc_term (unchecked) \<open>TOE\<close>}
that is a component of another @{cc_term (unchecked) \<open>composed_TOE\<close>}\<close>
Definition*[CAP, short_name="''composition assurance package''"]
\<open> \<^cc_term>\<open>AP\<close> consisting of components drawn predominately from the ACO \<^cc_term>\<open>class_cc\<close>,
representing a point on the pre-defined scale for composition assurance\<close>
Definition*[composed_TOE, short_name="''composed target of evaluation''"]
\<open>@{cc_term (unchecked) \<open>TOE\<close>} comprising solely two or more separately identified components
with a security relationship between their @{cc_term (unchecked) \<open>TSF\<close>}\<close>
Definition*[composed_evaluation, short_name="''composed evaluation''"]
\<open>evaluation of a \<^cc_term>\<open>composed_TOE\<close> using the specific evaluation technique applicable to \<^cc_term>\<open>composed_TOE\<close>s\<close>
declare_reference*[composite_product]
declare_reference*[composite_TOE]
Definition*[composite_evaluation, short_name="''composite evaluation''"]
\<open>evaluation of a @{cc_term (unchecked) \<open>composite_TOE\<close>}/@{cc_term (unchecked) \<open>composite_product\<close>}
using the specific composite evaluation technique\<close>
Definition*[composite_product, short_name="''composite product''"]
\<open>product comprised of two or more components which can be organized in two layers:
a layer of one already evaluated \<^cc_term>\<open>base_component\<close> (\<^cc_term>\<open>base_TOE\<close>)
and a layer of one @{cc_term (unchecked) \<open>dependent_component\<close>}\<close>
Definition*[COMP, short_name="''composite product assurance package''"]
\<open>\<close>
Definition*[composite_TOE, short_name="''composite target of evaluation''"]
\<open>part of a \<^cc_term>\<open>composite_product\<close> including the \<^cc_term>\<open>base_TOE\<close>
and the @{cc_term (unchecked) \<open>dependent_component\<close>}\<close>
Definition*[CM, short_name="''configuration management''"]
\<open>discipline applying technical and administrative direction and surveillance to:
identify and document the functional and physical characteristics of a configuration item,
control changes to those characteristics, record and report change processing
and implementation status, and verify compliance with specified requirements\<close>
Definition*[CMS, short_name="''configuration management system''"]
\<open>set of procedures and tools (including their documentation) used by a @{cc_term (unchecked) \<open>developer\<close>}
to develop and maintain configurations of their products during their life-cycles\<close>
Definition*[counter]
\<open>act on or respond to a particular threat so that the threat is eradicated or mitigated\<close>
declare_reference*[ST]
declare_reference*[PP_configuration]
Definition*[DC, short_name="''demonstrable conformance''"]
\<open>relation between a @{cc_term (unchecked) \<open>PP\<close>}/@{cc_term (unchecked) \<open>ST\<close>} (PP/ST)
and a @{cc_term (unchecked) \<open>PP\<close>}, or an @{cc_term (unchecked) \<open>ST\<close>} and
a @{cc_term (unchecked) \<open>PP_configuration\<close>}, where the PP/ST provides an equivalent or
more restrictive solution that solves the generic security problem in the PP/PP-Configuration\<close>
declare_reference*[FP]
Definition*[dependency]
\<open>relationship between components such that a @{cc_term (unchecked) \<open>PP\<close>}, @{cc_term (unchecked) \<open>ST\<close>},
@{cc_term (unchecked) \<open>FP\<close>} or \<^cc_term>\<open>AP\<close>} including a component
also includes any other \<^cc_term>\<open>component\<close>s that are identified as being depended upon
or include a rationale as to why they are not\<close>
declare_reference*[dependent_entity]
Definition*[dependent_component, short_name="''dependent component''"]
\<open>@{cc_term (unchecked)\<open>dependent_entity\<close>} in a multi-component product that relies on
the provision of services and resources by one or more \<^cc_term>\<open>base_component\<close>s\<close>
Definition*[dependent_TOE, short_name="''dependent target of evaluation''"]
\<open>\<^cc_term>\<open>dependent_component\<close> which is itself the subject of an evaluation\<close>
Definition*[developper]
\<open>organization responsible for the development of the @{cc_term (unchecked)\<open>TOE\<close>}\<close>
declare_reference*[SPD]
declare_reference*[SO]
declare_reference*[operational_environment]
Definition*[direct_rationale, short_name="''direct rationale''"]
\<open>type of @{cc_term (unchecked)\<open>PP\<close>}, @{cc_term (unchecked)\<open>PP_module\<close>} or @{cc_term (unchecked)\<open>ST\<close>}
in which the @{cc_term (unchecked)\<open>SPD\<close>} elements are mapped directly to
the @{cc_term (unchecked)\<open>SFR\<close>}) and possibly to the @{cc_term (unchecked)\<open>SO\<close>}s
for the @{cc_term (unchecked)\<open>operational_environment\<close>}\<close>
Definition*[DAC, short_name="''discretionary access control''"]
\<open>\<close>
Definition*[element]
\<open>〈taxonomy〉 self-contained description of a security need assigned to @{cc_term (unchecked)\<open>SAR\<close>}
or @{cc_term (unchecked)\<open>SFR\<close>}\<close>
Definition*[entity]
\<open>identifiable item that is described by a set or collection of properties\<close>
Definition*[evaluation]
\<open>assessment of a @{cc_term (unchecked)\<open>PP_configuration\<close>}, @{cc_term (unchecked)\<open>PP\<close>},
a @{cc_term (unchecked)\<open>ST\<close>}, or a @{cc_term (unchecked)\<open>TOE\<close>}, against defined criteria
\<close>
Definition*[EA, short_name="''evaluation activity''"]
\<open>activity derived from one or more work units\<close>
Definition*[EAL, short_name="''evaluation assurance level''"]
\<open>well-formed package of @{cc_term (unchecked)\<open>SAR\<close>} representing a point on the pre- defined assurance scale\<close>
declare_reference*[evaluation_scheme]
Definition*[evaluation_authority, short_name="''evaluation authority''"]
\<open>body operating an @{cc_term (unchecked)\<open>evaluation_scheme\<close>}\<close>
Definition*[EM, short_name="''evaluation method''"]
\<open>set of one or more \<^cc_term>\<open>EA\<close> for application in a specific context\<close>
Definition*[evaluation_scheme, short_name="''evaluation scheme''"]
\<open>rules, procedures and management to carrying evaluations of IT product security\<close>
declare_reference*[overall_verdict]
Definition*[ETR, short_name="''evaluation technical report''"]
\<open>documentation of the @{cc_term (unchecked)\<open>overall_verdict\<close>} and its justification, produced
by the @{cc_term (unchecked)\<open>evaluator\<close>}, and submitted to an \<^cc_term>\<open>evaluation_authority\<close>\<close>
Definition*[ETR_COMP, short_name="''evaluation technical report for composite evaluation''"]
\<open>documentation intended to be used within the \<^cc_term>\<open>composite_evaluation\<close> approach and derived
by the \<^cc_term>\<open>base_component\<close> @{cc_term (unchecked)\<open>evaluator\<close>} from the full \<^cc_term>\<open>ETR\<close>
for the evaluated \<^cc_term>\<open>base_component\<close>\<close>
Definition*[evaluator]
\<open>individual assigned to perform evaluations in accordance with a given evaluation standard and
associated evaluation methodology\<close>
Definition*[EC, short_name="''exact conformance''"]
\<open>hierarchical relationship between a @{cc_term (unchecked)\<open>PP\<close>} or @{cc_term (unchecked)\<open>PP_configuration\<close>}
and a @{cc_term (unchecked)\<open>ST\<close>} where all the requirements in the ST are drawn only from the PP/PP- Configuration\<close>
Definition*[exploitable_vulnerability, short_name="''exploitable vulnerability''"]
\<open>weakness in the @{cc_term (unchecked)\<open>TOE\<close>} that can be used to violate the @{cc_term (unchecked)\<open>SFR\<close>}s
in the @{cc_term (unchecked)\<open>operational_environment\<close>} for the @{cc_term (unchecked)\<open>TOE\<close>}\<close>
Definition*[extended_security_requirement, short_name="''extended security requirement''"]
\<open>security requirement developed according to the rules in this document,
but which are not listed in any part of the CC\<close>
Definition*[user, short_name="''external entity''"]
\<open>human technical system or one of its components interacting with the @{cc_term (unchecked)\<open>TOE\<close>}
from outside of the TOE boundary\<close>
Definition*[family]
\<open>〈taxonomy〉 set of components that shares a similar goal but differs in emphasis or rigour\<close>
Definition*[FP, short_name="''functional package''"]
\<open>named set of @{cc_term (unchecked)\<open>SFR\<close>}s that may be accompanied by a @{cc_term (unchecked)\<open>SPD\<close>}
and @{cc_term (unchecked)\<open>SO\<close>}s derived from that SPD
\<close>
declare_reference*[multi_assurance_evaluation]
Definition*[global_AP, short_name="''global assurance package''"]
\<open>\<^cc_term>\<open>AP\<close> that applies to the entire @{cc_term (unchecked)\<open>TOE\<close>} in a
@{cc_term (unchecked)\<open>multi_assurance_evaluation\<close>}\<close>
Definition*[guidance_documentation, short_name="''guidance documentation''"]
\<open>documentation that describes the delivery, preparation, operation, management and/or use of the @{cc_term (unchecked)\<open>TOE\<close>}\<close>
declare_reference*[refinement]
Definition*[implementation_representation, short_name="''implementation representation''"]
\<open>least abstract representation of the @{cc_term (unchecked)\<open>TSF\<close>}, specifically the one
that is used to create the TSF itself without further design @{cc_term (unchecked)\<open>refinement\<close>}\<close>
Definition*[internally_consistent, short_name="''internally consistent''"]
\<open>no apparent contradictions exist between any aspects of an \<^cc_term>\<open>entity\<close>\<close>
Definition*[interpretation_cc, short_name="''interpretation''"]
\<open>clarification or amplification of a standard or an \<^cc_term>\<open>evaluation_scheme\<close> requirement\<close>
Definition*[iteration]
\<open>use of the same \<^cc_term>\<open>component\<close> to express two or more distinct requirements\<close>
Definition*[layering]
\<open>design technique where separate groups of components are hierarchically organized to have separate
responsibilities such that a group of components depends on groups of components below it in
the hierarchy for services, and provides its services to the groups of components above it\<close>
Definition*[module_cc, short_name="''module''"]
\<open>architectural unit specified at a level suitable for implementation of the unit\<close>
Definition*[multi_assurance_evaluation, short_name="''multi-assurance evaluation''"]
\<open>evaluation of a @{cc_term (unchecked)\<open>TOE\<close>} using a @{cc_term (unchecked)\<open>PP_configuration\<close>}
where each PP- Configuration component is associated with its own set of assurance requirements\<close>
Definition*[object]
\<open>\<^cc_term>\<open>entity\<close>in the @{cc_term (unchecked)\<open>TOE\<close>} that contains or receives information, and
upon which subjects perform operations\<close>
Definition*[operation]
\<open>〈on an \<^cc_term>\<open>object\<close>〉 specific type of \<^cc_term>\<open>action\<close> performed by a subject on an object
\<close>
Definition*[operational_environment, short_name="''operational environment''"]
\<open>environment in which the @{cc_term (unchecked)\<open>TOE\<close>} is operated, consisting of everything
that is outside the TOE boundary\<close>
Definition*[optional_SFR, short_name="''optional Security Functional Requirement''"]
\<open>@{cc_term (unchecked)\<open>SFR\<close>} in a @{cc_term (unchecked)\<open>PP\<close>}, @{cc_term (unchecked)\<open>FP\<close>}, or
@{cc_term (unchecked)\<open>PP_module\<close>} that contributes to a stated aspect of the PPs security problem
description but whose inclusion in a conformant PPs or @{cc_term (unchecked)\<open>ST\<close>} list of
SFRs is not mandatory\<close>
Definition*[OSP, short_name="''organizational security policy''"]
\<open>set of security rules, procedures, or guidelines for an organization\<close>
Definition*[overall_verdict, short_name="''overall verdict''"]
\<open>statement issued by an \<^cc_term>\<open>evaluator\<close> with respect to the result of an \<^cc_term>\<open>evaluation\<close>\<close>
Definition*[potential_vulnerability, short_name="''potential vulnerability''"]
\<open>suspected, but not confirmed, weakness
\<close>
Definition*[PP, short_name="''Protection Profile''"]
\<open>implementation-independent statement of security needs for a @{cc_term (unchecked)\<open>TOE\<close>} type\<close>
Definition*[PP_configuration, short_name="''Protection Profile Configuration''"]
\<open>implementation-independent statement of security needs for a @{cc_term (unchecked)\<open>TOE\<close>} type
containing at least one \<^cc_term>\<open>PP\<close> and an additional non-empty set of @{cc_term (unchecked)\<open>PP_module\<close>}
(with the associated PP-Modules Bases)\<close>
Definition*[PP_configuration_component, short_name="''Protection Profile Configuration component''"]
\<open>\<^cc_term>\<open>PP\<close> or @{cc_term (unchecked)\<open>PP_module\<close>} included in a \<^cc_term>\<open>PP_configuration\<close>\<close>
Definition*[PP_module, short_name="''Protection Profile module''"]
\<open>implementation-independent statement of security needs for a @{cc_term (unchecked)\<open>TOE\<close>} type
complementary to one or more base \<^cc_term>\<open>PP\<close> and possibly some \<^cc_term>\<open>base_PP_module\<close>\<close>
Definition*[PP_module_base, short_name="''Protection Profile Module Base''"]
\<open>set of either \<^cc_term>\<open>PP_module\<close> or \<^cc_term>\<open>PP\<close> or both, specified by a PP- Module as a basis
for building a \<^cc_term>\<open>PP_configuration\<close>\<close>
Definition*[refinement]
\<open>addition of details to a security component\<close>
Definition*[residual_vulnerability, short_name="''residual vulnerability''"]
\<open>weakness that cannot be exploited in the \<^cc_term>\<open>operational_environment\<close> for the
@{cc_term (unchecked)\<open>TOE\<close>}, but that can be used to violate the @{cc_term (unchecked)\<open>SFR\<close>}s by
an attacker with greater \<^cc_term>\<open>attack_potential\<close> than is anticipated in the operational
environment for the TOE\<close>
Definition*[role]
\<open>pre-defined set of rules establishing the allowed interactions between a user and the @{cc_term (unchecked)\<open>TOE\<close>}\<close>
Definition*[SAR, short_name="''security assurance requirement''"]
\<open>security requirement that refers to the conditions and processes for the development and delivery
of the @{cc_term (unchecked)\<open>TOE\<close>}, and the \<^cc_term>\<open>action\<close>s required of \<^cc_term>\<open>evaluator\<close>s
with respect to evidence produced from these conditions and processes
\<close>
Definition*[security_attribute, short_name="''security attribute''"]
\<open>property of subjects, users, objects, information, sessions and/or resources that is used in
defining the @{cc_term (unchecked)\<open>SFR\<close>}s and whose values are used in enforcing the SFRs
\<close>
Definition*[SFR, short_name="''security functional requirement''"]
\<open>security requirement, which contributes to fulfil the @{cc_term (unchecked)\<open>TOE\<close>}
@{cc_term (unchecked)\<open>SPD\<close>} as defined in a specific @{cc_term (unchecked)\<open>ST\<close>} or in a \<^cc_term>\<open>PP\<close>\<close>
Definition*[SO, short_name="''security objective''"]
\<open>statement of an intent to \<^cc_term>\<open>counter\<close> identified threats and/or satisfy identified
organization security policies and/or assumptions\<close>
Definition*[SPD, short_name="''security problem definition''"]
\<open>statement, which in a formal manner defines the nature and scope of the security that the
@{cc_term (unchecked)\<open>TOE\<close>} is intended to address\<close>
Definition*[SR, short_name="''security requirement''"]
\<open>requirement, which is part of a @{cc_term (unchecked)\<open>TOE\<close>} security specification as defined
in a specific @{cc_term (unchecked)\<open>ST\<close>} or in a \<^cc_term>\<open>PP\<close>\<close>
Definition*[ST, short_name="''Security Target''"]
\<open>implementation-dependent statement of security requirements for a @{cc_term (unchecked)\<open>TOE\<close>}
based on a \<^cc_term>\<open>SPD\<close>\<close>
Definition*[selection]
\<open>specification of one or more items from a list in a component\<close>
Definition*[selection_based_SFR, short_name="''selection-based security functional requirement''"]
\<open>\<^cc_term>\<open>SFR\<close>s in a \<^cc_term>\<open>PP\<close>, \<^cc_term>\<open>PP_module\<close>, or \<^cc_term>\<open>FP\<close> that contributes to a state
aspect of the PPs, PP-Modules or functional packages \<^cc_term>\<open>SPD\<close> that is to be included
in a conformant PP or ST if a selection choice identified in the PP/PP-Module/functional package
indicates that it has an associated selection-based SFR\<close>
Definition*[single_assurance_evaluation, short_name="''single-assurance evaluation''"]
\<open>evaluation of a @{cc_term (unchecked)\<open>TOE\<close>} using one set of assurance requirements\<close>
Definition*[SC, short_name="''strict conformance''"]
\<open>hierarchical relationship between a \<^cc_term>\<open>PP\<close> and a PP/\<^cc_term>\<open>PP\<close> where all the requirements
in the PP also exist in the PP/ST\<close>
Definition*[sub_TSF, short_name="''sub-TOE security functionality''"]
\<open>combined functionality of all hardware, software, and firmware of a @{cc_term (unchecked)\<open>TOE\<close>}
that is relied upon for the correct enforcement of the \<^cc_term>\<open>SFR\<close>s defined in one
\<^cc_term>\<open>PP_configuration\<close> component\<close>
Definition*[subject]
\<open>\<^cc_term>\<open>entity\<close> in the @{cc_term (unchecked)\<open>TOE\<close>} that performs operations on objects\<close>
Definition*[tailoring]
\<open>addition of one or more functional requirements to a \<^cc_term>\<open>FP\<close>, and/or the addition of one or
more selections to a \<^cc_term>\<open>SFR\<close> in a functional package\<close>
Definition*[TOE, short_name="''target of evaluation''"]
\<open>set of software, firmware and/or hardware possibly accompanied by guidance, which is the subject of an evaluation\<close>
Definition*[threat_agent, short_name="''threat agent''"]
\<open>\<^cc_term>\<open>entity\<close> that has potential to exercise \<^cc_term>\<open>adverse_action\<close> on \<^cc_term>\<open>asset\<close>s
protected by the \<^cc_term>\<open>TOE\<close>\<close>
Definition*[TSF, short_name="''TOE security functionality''"]
\<open>combined functionality of all hardware, software, and firmware of a \<^cc_term>\<open>TOE\<close> that is relied
upon for the correct enforcement of the \<^cc_term>\<open>SFR\<close>s\<close>
Definition*[TOE_type, short_name="''TOE type''"]
\<open>set of characteristics common to a group of \<^cc_term>\<open>TOE\<close>\<close>
Definition*[translation]
\<open>process of describing security requirements in a standardized language\<close>
Definition*[vulnerability]
\<open>weakness in the \<^cc_term>\<open>TOE\<close> that can be used to violate the \<^cc_term>\<open>SFR\<close>s in some environment\<close>
Definition*[DPA, short_name="''differential power analysis''"]
\<open>\<close>
Definition*[DRBG, short_name="''deterministic random bit generator''"]
\<open>\<close>
Definition*[ES, short_name="''electromagnetic spectrum''"]
\<open>\<close>
Definition*[GAP, short_name="''global assurance package''"]
\<open>\<close>
Definition*[GB, short_name="''gygabyte''"]
\<open>\<close>
Definition*[GHz, short_name="''gigahertz''"]
\<open>\<close>
Definition*[GUI, short_name="''graphical user interface''"]
\<open>\<close>
define_shortcut* csp \<rightleftharpoons> \<open>CSP\<close>
holcsp \<rightleftharpoons> \<open>HOL-CSP\<close>
hol \<rightleftharpoons> \<open>HOL\<close>
isabelle \<rightleftharpoons> \<open>Isabelle/HOL\<close>
(*text\<open>
@{boxed_theory_text [display]
\<open>\<close>
}\<close>*)
datatype cc_spec =
package

View File

@ -79,7 +79,9 @@ text*[ex_SPD::SPD]\<open>
SECURITY PROBLEM DEFINITION
The security problem definition of the DBMS PP Extended Package Access History does not change the security problem definition of the DBMS PP base.
\<close>
text*[ex_error::text_element]\<open>\<close>
(* text*[ex_error::text_element]\<open>
This instance is an example of the use of the reject clause by \<^monitor_PP_control>\<open>PP_monitor2\<close>
\<close> *)
text*[ex_treats::Threats]\<open>
Threats
This extended package neither adds to nor alters the threats given in [DBMS PP].