The following publications are possibly variants of this publication:
- A security specification verification technique based on the international standard ISO/IEC 15408Shoichi Morimoto, Shinjiro Shigematsu, Yuichi Goto, Jingde Cheng. SAC 2006: 1802-1803 [doi]
- A Supporting Tool for IT System Security Specification Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045Da Bao, Yuichi Goto, Jingde Cheng. pakdd 2019: 3-14 [doi]
- GEST: A Generator of ISO/IEC 15408 Security Target TemplatesDaisuke Horie, Kenichi Yajima, Noor Azimah, Yuichi Goto, Jingde Cheng. In Roger Y. Lee, Gongzhu Hu, Huaikou Miao, editors, Computer and Information Science 2009 [outstanding papers from the 8th ACIS/IEEE International Conference on Computer and Information Science, Shanghai, China, June 1-3, 2009]. Volume 208 of Studies in Computational Intelligence, pages 149-158, Springer, 2009. [doi]
- Development of Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045Da Bao, Wen Sun, Yuichi Goto, Jingde Cheng. uic 2018: 204-209 [doi]
- Formal verification of security specifications with common criteriaShoichi Morimoto, Shinjiro Shigematsu, Yuichi Goto, Jingde Cheng. SAC 2007: 1506-1512 [doi]
- A Security Requirement Management Database Based on ISO/IEC 15408Shoichi Morimoto, Daisuke Horie, Jingde Cheng. iccsa 2006: 1-10 [doi]