Xerox D110/D125 Copier/Printer
セキュリティターゲット
- 60 – Copyright
2012 by Fuji Xerox Co., Ltd
attributes, or named groups of SFP-relevant security
attributes].
- the list of subjects and objects controlled under the CPY
Access Control SFP in Table 21, and for each, the indicated
security attributes in Table 21.
FDP_ACF.1.2 (e) The TSF shall enforce the following rules to determine if an
operation among controlled subjects and controlled objects is
allowed: [assignment: rules governing access among
controlled subjects and controlled objects using controlled
operations on controlled objects].
[assignment: rules governing access among controlled
subjects and controlled objects using controlled operations on
controlled objects].
- rules specified in the CPY Access Control SFP in Table 21
governing access among Users and controlled objects using
controlled operations on controlled objects.
FDP_ACF.1.3 (e) The TSF shall explicitly authorize access of subjects to objects
based on the following additional rules: [assignment: rules,
based on security attributes, that explicitly authorize access of
subjects to objects].
[assignment: rules, based on security attributes, that
explicitly authorise access of subjects to objects].
- none
FDP_ACF.1.4 (e) The TSF shall explicitly deny access of subjects to objects
based on the following additional rules: [assignment: rules,
based on security attributes, that explicitly deny access of
subjects to objects].
[assignment: rules, based on security attributes, that
explicitly deny access of subjects to objects].
- none
FDP_ACF.1 (f) Security attribute based access control
Hierarchical to: No other components.
Dependencies: FDP_ACC.1 Subset access control
FMT_MSA.3 Static attribute initialization