EasyManua.ls Logo

Fuji Xerox C2265 - Page 36

Fuji Xerox C2265
136 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Fuji Xerox C2265/C2263 Security Target
- 31 - Copyright
2016 by Fuji Xerox Co., Ltd
Threats, policies, and
assumptions
Summary
Objectives and rationale
for authorization.
OE.USER.AUTHORIZED establishes
responsibility of the TOE Owner to
appropriately grant authorization.
T.DOC.ALT
User Document Data
may be altered by
unauthorized persons.
O.DOC.NO_ALT protects D.DOC from
unauthorized alteration.
O.USER.AUTHORIZED establishes user
identification and authentication as the basis
for authorization.
OE.USER.AUTHORIZED establishes
responsibility of the TOE Owner to
appropriately grant authorization.
T.FUNC.ALT
User Function Data may
be altered by
unauthorized persons.
O.FUNC.NO_ALT protects D.FUNC from
unauthorized alteration.
O.USER.AUTHORIZED establishes user
identification and authentication as the basis
for authorization.
OE.USER.AUTHORIZED establishes
responsibility of the TOE Owner to
appropriately grant authorization.
T.PROT.ALT
TSF Protected Data may
be altered by
unauthorized persons.
O.PROT.NO_ALT protects D.PROT from
unauthorized alteration.
O.USER.AUTHORIZED establishes user
identification and authentication as the basis
for authorization.
OE.USER.AUTHORIZED establishes
responsibility of the TOE Owner to
appropriately grant authorization.
T.CONF.DIS
TSF Confidential Data
may be disclosed to
unauthorized persons.
O.CONF.NO_DIS protects D.CONF from
unauthorized disclosure.
O.USER.AUTHORIZED establishes user
identification and authentication as the basis
for authorization.
OE.USER.AUTHORIZED establishes
responsibility of the TOE Owner to
appropriately grant authorization
T.CONF.ALT
TSF Confidential Data
may be altered by
unauthorized persons.
O.CONF.NO_ALT protects D.CONF from
unauthorized alteration.
O.USER.AUTHORIZED establishes user

Table of Contents

Related product manuals