EasyManua.ls Logo

Fuji Xerox C2265 - Page 5

Fuji Xerox C2265
136 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
- iv -
Table 33 Initialization property .............................................................................................................................. 79
Table 34 Initialization property .............................................................................................................................. 81
Table 35 Initialization property .............................................................................................................................. 84
Table 36 Operation of TSF Data ............................................................................................................................. 84
Table 37 Operation of TSF Data ............................................................................................................................. 86
Table 38 Security Management Functions Provided by TSF ....................................................................... 86
Table 39 Security Assurance Requirements ........................................................................................................ 93
Table 40 Security Functional Requirements and the Corresponding Security Objectives ................ 94
Table 41 Security Objectives to SFR Rationale .................................................................................................. 96
Table 42 Dependencies of Functional Security Requirements ................................................................. 103
Table 43 Security Functional Requirements and the Corresponding TOE Security Functions ..... 108
Table 44 Management of security attributes ................................................................................................. 113
Table 45 Access Control for Basic Functions ................................................................................................... 115
Table 46 Access Control for User Data .............................................................................................................. 115
Table 47 Details of Security Audit Log .............................................................................................................. 120

Table of Contents

Related product manuals