The following publications are possibly variants of this publication:
- A Supporting Tool for IT System Security Specification Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045Da Bao, Yuichi Goto, Jingde Cheng. pakdd 2019: 3-14 [doi]
- FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408Kenichi Yajima, Shoichi Morimoto, Daisuke Horie, Noor Sheila Azreen, Yuichi Goto, Jingde Cheng. IEEEares 2009: 624-629 [doi]
- A security specification verification technique based on the international standard ISO/IEC 15408Shoichi Morimoto, Shinjiro Shigematsu, Yuichi Goto, Jingde Cheng. SAC 2006: 1802-1803 [doi]
- A Security Requirement Management Database Based on ISO/IEC 15408Shoichi Morimoto, Daisuke Horie, Jingde Cheng. iccsa 2006: 1-10 [doi]
- GEST: A Generator of ISO/IEC 15408 Security Target TemplatesDaisuke Horie, Kenichi Yajima, Noor Azimah, Yuichi Goto, Jingde Cheng. In Roger Y. Lee, Gongzhu Hu, Huaikou Miao, editors, Computer and Information Science 2009 [outstanding papers from the 8th ACIS/IEEE International Conference on Computer and Information Science, Shanghai, China, June 1-3, 2009]. Volume 208 of Studies in Computational Intelligence, pages 149-158, Springer, 2009. [doi]
- A Web User Interface of the Security Requirement Management Database Based on ISO/IEC 15408Daisuke Horie, Shoichi Morimoto, Jingde Cheng. iccS 2006: 797-804 [doi]