Page 6 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
List of Figures
Figure 1: Example TOE environment
..............................................................................................................
9
Figure 2: Hardware configuration of TOE
.....................................................................................................
11
Figure 3: Logical boundaries of TOE
.............................................................................................................
17
List of Tables
Table 1: List of administrator roles
................................................................................................................
16
Table 2: Correspondence between operations authorised by permissions to process document data and
operations possible on document data
............................................................................................................
21
Table 3: Relationship between security environment and security objectives
...............................................
30
Table 4: List of auditable events
....................................................................................................................
34
Table 5: List of cryptographic key generation
................................................................................................
39
Table 6: List of Cryptographic operations
......................................................................................................
39
Table 7: List of subjects, objects, and operations among subjects and objects
..............................................
40
Table 8: Subjects, objects and security attributes
...........................................................................................
40
Table 9: Rules governing access
....................................................................................................................
40
Table 10: Rules governing access explicitly
..................................................................................................
41
Table 11: List of subjects, information and operation
....................................................................................
41
Table 12: Security attributes corresponding to subjects or information
.........................................................
42
Table 13: List of authentication events
...........................................................................................................
42
Table 14: Lockout release actions
..................................................................................................................
43
Table 15: Rules for initial association of attributes
........................................................................................
45
Table 16: Management roles of security attributes
.........................................................................................
45
Table 17: Characteristics of static attribute initialisation
...............................................................................
46
Table 18: List of TSF data management
.........................................................................................................
47
Table 19: List of specifications of Management Functions
............................................................................
48
Table 20: Services requiring trusted paths
.....................................................................................................
53
Table 21: TOE Security assurance requirements (EAL3)
..............................................................................
54
Table 22: Relationship between security objectives and functional requirements
.........................................
55
Table 23: Correspondence of dependencies of TOE security functional requirements
..................................
60
Table 24: Relationship between TOE security functional requirements and TOE security functions
...........
63
Table 25: Auditable events and auditable information
...................................................................................
65
Table 26: User roles and authentication methods
...........................................................................................
67
Table 27: Unlocking administrators for each user role
..................................................................................
68
Table 28: Default value for document data ACL
...........................................................................................
69
Table 29: Operations on document data ACL and Authorised users
..............................................................
70
Table 30: Access to administrator information
...............................................................................................
71
Table 31: Authorised operations on general user information
........................................................................
72
Table 32: Administrators authorised to specify machine control data
............................................................
73
Table 33: List of encryption operations on data stored on the HDD
..............................................................
74
Table 34: Specific terms used in this ST
........................................................................................................
77