|
Par ce dispositif a également d'autres instructions :
Facilité d'utilisation
- List of Figures and Tables -
Figure 1: General Operational Environment .......................................................... 5
Figure 2: MFD Units and TOE Logical Scope .......................................................... 9
Figure 3: Authentication Flow for Private Print and Mailbox ................................... 12
Figure 4: MFD Units and TOE Physical Scope ...................................................... 16
Figure 5: Assets under and not under Protection ................................................. 20
Table 1: Function Types and Functions Provided by the TOE .................................... 2
Table 2: User Role Assumptions .......................................................................... 8
Table 3: TOE Basic Functions .............................................................................. 9
Table 4: Categories of TOE Setting Data............................................................. 20
Table 5: Threats Addressed by the TOE .............................................................. 21
Table 6: Organizational Security Policy ............................................................... 22
Table 7: Assumptions ...................................................................................... 22
Table 8: Security Objectives for the TOE ............................................................ 23
Table 9: Security Objectives for the Environment ................................................ 24
Table 10: Assumptions / Threats / Organizational Security Policies and the
Corresponding Security Objectives ............................................................... 24
Table 11: Security Objectives Rationale for Security Problem ................................ 25
Table 12: Auditable Events of TOE and Individually Defined Auditable Events .......... 34
Table 13: Operations between Subjects and Objects Covered by MFD Access Control SFP
.............................................................................................................. 40
Table 14: Rules for Access Control .................................................................... 41
Table 15: Rules for Explicit Access Authorization ................................................. 42
Table 16: Subjects, Information, and Operations that cause the information to flow . 43
Table 17: List of Security Functions ................................................................... 50
Table 18: Security Attributes and Authorized Roles .............................................. 51
Table 19 Initialization property ........................................................................ 52
Table 20: Operation of TSF Data ....................................................................... 53
Table 21: Security Management Functions Provided by TSF .................................. 54
Table 22: EAL3 Assurance Requirements ............................................................ 59
Table 23: Security Functional Requirements and the Corresponding Security Objectives
.............................................................................................................. 60
Table 24: Security Objectives to SFR Rationale ................................................... 61
Table 25: Dependencies of Functional Security Requirements ................................ 65
Table 26: Security Functional Requirements and the Corresponding TOE Security
Functions ................................................................................................. 69
Table 27: Management of security attributes ...................................................... 74
Table 28: Access Control .................................................................................. 75
Table 29: Details of Security Audit Log Data ....................................................... 79
iii
...