Xerox  Multi-Function Device Security Target 
 
77 
Copyright
 2013 Xerox Corporation. All rights reserved. 
8.  Glossary  
For the purposes of this document, the following terms and definitions apply. 
IEEE  Std.  100,  The  Authoritative  Dictionary  of  IEEE  Standards,  Seventh 
Edition, should be referenced for terms not defined in this annex. 
Access: Interaction between an entity and an object that results in the flow or 
modification of data.  
Access  Control:  Security  service  that  controls  the  use  of  hardware  and 
software  resources  and  the  disclosure  and  modification  of  stored  or 
communicated data.  
Accountability: Property that allows activities in an IT system to be traced to 
the entity responsible for the activity.  
Administrator:  A  User  who  has  been  specifically  granted  the  authority  to 
manage some  portion or all of  the TOE  and whose  actions may affect the 
TSP. Administrators may possess special privileges that provide capabilities 
to override portions of the TSP.  
Asset: An entity upon which the TOE Owner, User, or manager of the TOE 
places value. 
Authentication: Security measure that verifies a claimed identity.  
Authentication data: Information used to verify a claimed identity.  
Authorization:  Permission,  granted  by  an  entity  authorized  to  do  so,  to 
perform functions and access data.  
Authorized User: An authenticated User who may, in accordance with the 
TSP, perform an operation, This includes Users who are permitted to perform 
some operations but may be able to attempt or perform operations that are 
beyond those permissions. 
Availability:  (A)  A  condition  in  which  Authorized  Users  have  access  to 
information, functionality and associated assets when requested. (B) Timely 
(according to a defined metric), reliable access to IT resources. 
Channel: Mechanisms through which data can be transferred into and out of 
the TOE. 
Confidentiality:  (A)  A  condition  in  which  information  is  accessible  only  to 
those authorized to have access. (B) A security policy pertaining to disclosure 
of data. 
Enterprise: An operational context typically consisting of centrally-managed 
networks  of  IT  products  protected  from  direct  Internet  access  by  firewalls. 
Enterprise  environments  generally  include  medium  to  large  businesses, 
certain  governmental  agencies,  and  organizations  requiring  managed 
telecommuting systems and remote offices