6.1.2Identication&Authentication...................................................................6-3
6.1.3SecurityManagement...............................................................................6-4
6.1.4TOEAccess.............................................................................................6-7
6.1.5Userdataprotection.................................................................................6-7
6.1.6TrustedChannel.......................................................................................6-9
Chapter7RATIONALE...............................................................................7-1
7.1RATIONALEFORSECURITYOBJECTIVES.......................................................7-1
7.1.1RationaleforSecurityObjectivesfortheTOE.............................................7-1
7.1.2RationaleforSecurityObjectivesfortheEnvironment.................................7-1
7.2SECURITYREQUIREMENTSRATIONALE.........................................................7-2
7.2.1RationaleforTOEsecurityfunctionalrequirements.....................................7-2
7.2.2RationaleforSecurityAssuranceRequirements.........................................7-6
7.2.3FunctionalRequirementDependenciesRationale......................................7-6
AppendixADocumentTerminology........................................................A-1
Tables..............................................................................................................I
II