EasyManua.ls Logo

Fuji Xerox C2265 - Table 24 D.FUNC Operation List

Fuji Xerox C2265
136 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Fuji Xerox C2265/C2263 Security Target
- 57 - Copyright
2016 by Fuji Xerox Co., Ltd
FDP_ACC.1 (h) Subset access control
Hierarchical to: No other components.
Dependencies: FDP_ACF.1 Security attribute based access control
FDP_ACC.1.1 (h) The TSF shall enforce the [assignment: access control SFP] on
[assignment: list of subjects, objects, and operations among subjects
and objects covered by the SFP].
[assignment: access control SFP]
- D.FUNC Access Control SFP in Table 24
[assignment: list of subjects, objects, and operations among subjects
and objects covered by the SFP].
- the list of subjects, objects, and operations among subjects and
objects in Table 24
Table 24 D.FUNC Operation List
Object Attribute(s) Operation Subject Access control rule
D.FUNC - User identifier
- Owner identifier of
D.FUNC
Register the
Mailbox
U.USER When the owner identifier
of D.FUNC matches the
user identifier, operation to
register the Mailbox is
permitted.
FDP_ACF.1 (a) Security attribute based access control
Hierarchical to: No other components.
Dependencies: FDP_ACC.1 Subset access control
FMT_MSA.3 Static attribute initialization
FDP_ACF.1.1 (a) The TSF shall enforce the [assignment: access control SFP] to objects
based on the following: [assignment: list of subjects and objects
controlled under the indicated SFP, and for each, the SFP-relevant
security attributes, or named groups of SFP-relevant security
attributes].
[assignment: access control SFP]
- Common Access Control SFP in Table 16
[assignment: list of subjects and objects controlled under the
indicated SFP, and for each, the SFP-relevant security attributes, or
named groups of SFP-relevant security attributes].
- the list of users as subjects and objects controlled under the
Common Access Control SFP in Table 16, and for each, the indicated
security attributes in Table 17

Table of Contents

Related product manuals