Page 6 of 83
List of Figures
Figure 1: Environment for Usage of TOE
.....................................................................................................
11
Figure 2: Hardware Configuration of TOE
...................................................................................................
13
Figure 3: Logical Scope of TOE
...................................................................................................................
19
Figure 4: Operation Panel (for North America)
............................................................................................
20
List of Tables
Table 1: List of TOE
........................................................................................................................................
9
Table 2: List of Administrator Roles
.............................................................................................................
18
Table 3: Correspondence Table for Operation Permissions on Document Data and Operations on Document
Data
...............................................................................................................................................................
23
Table 4: Relation between Security Environment and Security Objectives
..................................................
32
Table 5: List of Auditable Events
..................................................................................................................
36
Table 6: List of Cryptographic Key Generation
............................................................................................
41
Table 7: List of Cryptographic Operation
.....................................................................................................
41
Table 8: List of Subjects, Objects, and Operations among Subjects and Objects
.........................................
42
Table 9: Subjects, Objects and Security Attributes
.......................................................................................
42
Table 10: Rules Governing Access
................................................................................................................
43
Table 11: Rules Governing Access Explicitly
...............................................................................................
43
Table 12: List of Subjects, Information and Operation
.................................................................................
44
Table 13: Security Attributes Corresponding to Subjects or Information
.....................................................
44
Table 14: List of Authentication Events
........................................................................................................
45
Table 15: Lockout Release Actions
...............................................................................................................
45
Table 16: Rules for Initial Association of Attributes
.....................................................................................
47
Table 17: Management Roles of Security Attributes
.....................................................................................
48
Table 18: Characteristics of Static Attribute Initialisation
.............................................................................
49
Table 19: List of TSF Data Management
......................................................................................................
49
Table 20: List of Specification of Management Functions
............................................................................
51
Table 21: Services Requiring Trusted Path
...................................................................................................
55
Table 22: TOE Security Assurance Requirements (EAL3)
...........................................................................
56
Table 23: Relation between Security Objectives and Functional Requirements
...........................................
57
Table 24: Correspondence Table of Dependencies of TOE Security Functional Requirements
....................
62
Table 25: Relation between TOE Security Functional Requirements and TOE Security Functions
.............
65
Table 26: Auditable Events and Auditable Information
................................................................................
67
Table 27: User Roles and Authentication Methods
.......................................................................................
69
Table 28: Unlocking Administrators for Each User Role
..............................................................................
70
Table 29: Initial Value for Document Data ACL
...........................................................................................
72
Table 30: Operations on the Document Data ACL and Authorised Operators
..............................................
72
Table 31: Access to Administrator Information
.............................................................................................
73
Table 32: Authorised Operations on General User Information
....................................................................
74
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.