Page 5 of 87
Table 37: List of Cryptographic Operations for Stored Data Protection ....................................................... 75
Table 38: Unlocking Administrators for Each User Role.............................................................................. 77
Table 39: Functions Provided by the TOE, Identified User and Authentication Procedures......................... 79
Table 40: Security Attributes Management of Common Access Control SFP .............................................. 80
Table 41: Security Attributes Management of TOE Function Access Control SFP ...................................... 81
Table 42: List of Static Initialisation for Security Attributes of Common Access Control SFP.................... 82
Table 43: Management of TSF Data ............................................................................................................. 83
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.