Page 6 of 80
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
List of Figures
Figure 1: Example TOE environment
..............................................................................................................
9
Figure 2: Hardware configuration of TOE
.....................................................................................................
11
Figure 3: Logical boundaries of TOE
.............................................................................................................
16
List of Tables
Table 1: List of administrator roles
................................................................................................................
15
Table 2: Correspondence between operations authorised by permissions to process document data
............
20
Table 3: Relationship between security environment and security objectives
...............................................
29
Table 4: List of auditable events
....................................................................................................................
33
Table 5: List of cryptographic key generation
................................................................................................
38
Table 6: List of cryptographic operations
.......................................................................................................
38
Table 7: List of subjects, objects, and operations among subjects and objects
..............................................
39
Table 8: Subjects, objects and security attributes
...........................................................................................
39
Table 9: Rules governing access
....................................................................................................................
40
Table 10: Rules governing access explicitly
..................................................................................................
40
Table 11: List of subjects, information and operation
....................................................................................
41
Table 12: Security attributes corresponding to subjects or information
.........................................................
41
Table 13: List of authentication events
...........................................................................................................
42
Table 14: Lockout release actions
..................................................................................................................
42
Table 15: Rules for initial association of attributes
........................................................................................
44
Table 16: Management roles of security attributes
.........................................................................................
45
Table 17: Characteristics of static attribute initialisation
...............................................................................
46
Table 18: List of TSF data management
.........................................................................................................
46
Table 19: List of specifications of Management Functions
............................................................................
48
Table 20: Services requiring trusted paths
.....................................................................................................
52
Table 21: TOE security assurance requirements (EAL3)
...............................................................................
53
Table 22: Relationship between security objectives and functional requirements
.........................................
54
Table 23: Correspondence of dependencies of TOE security functional requirements
..................................
59
Table 24: Relationship between TOE security functional requirements and TOE Security Functions
..........
62
Table 25: Auditable events and auditable information
...................................................................................
64
Table 26: User roles and authentication methods
...........................................................................................
66
Table 27: Unlocking administrators for each user role
..................................................................................
67
Table 28: Default value for document data ACL
...........................................................................................
68
Table 29: Operations of document data ACL and authorised users
................................................................
69
Table 30: Access to administrator information
...............................................................................................
70
Table 31: Authorised operations on general user information
........................................................................
71
Table 32: Administrators authorised to specify machine control data
............................................................
72
Table 33: List of encryption operations on data stored on the HDD
..............................................................
73
Table 34: Specific terms used in this ST
........................................................................................................
76