This paper traces the history and evolution of the various criteria efforts associated with computer system and network security. It notes several new security requirements arising from new system architectures, intense networking, different operatio...