Xerox  Multi-Function Device Security Target 
 
21 
Copyright
 2013 Xerox Corporation. All rights reserved. 
Note:  IEEE  Std.  2600.2-2009  defines  D.PROT  and  D.CONF,  and  requires 
the ST author to categorize all TSF data as one of these two types:  
1.  TSF  Protected  Data.  Data  that  should  be  protected,  but  does  not 
affect the operational security of the TOE if it is disclosed (D.PROT). 
2.  TSF Confidential Data. Data that does affect the operational security 
of the TOE if it is disclosed (D.CONF).  
3.1.2.3.  Functions 
Functions perform processing, storage, and transmission of data that may be 
present  in  Hardcopy  Device  (HCD)  products.  These  functions  are used by 
SFR packages, and are identified and defined in Table 11 below. 
Table 11:  SFR package functions for IEEE Std. 2600.2-2009 
Printing: a function in which electronic document input is converted to 
physical document output 
Scanning: a function in which physical document input is converted to 
electronic document output 
Copying: a function in which physical document input is duplicated to 
physical document output 
Faxing: a function in which physical document input is converted to a 
telephone-based document facsimile (fax) transmission, and a function in 
which a telephone-based document facsimile (fax) reception is converted 
to physical document output 
Document storage and retrieval: a function in which a document is stored 
during one job and retrieved during one or more subsequent jobs 
Shared-medium interface: a function that transmits or receives User Data 
or TSF Data over a communications medium which, in conventional 
practice, is or can be simultaneously accessed by multiple users, such as 
wired network media and most radio-frequency wireless media 
3.1.3.  Operations 
Operations are a specific type of action performed by a Subject on an Object. 
In  this  Security  Target,  five  types  of  operations  are  considered:  those  that 
result  in  disclosure  of  information  (Read),  those  that  result  in  alteration  of 
information  (Create,  Modify,  Delete),  and  those  that  invoke  a  function 
(Execute). 
3.1.4.  Channels 
Channels  are  the  mechanisms  through  which  data  can  be  transferred  into 
and  out  of  the  TOE.  In  this  Security  Target,  four  types  of  Channels  are 
allowed: