- List of Figures and Tables -
Figure 1 General Operational Environment ........................................................................................................... 6
Figure 4 MFD Units and TOE Physical Scope ..................................................................................................... 17
Table 1 Function Types and Functions provided by the TOE .......................................................................... 2
Table 2 User Role Assumptions .................................................................................................................................. 8
Table 3 TOE Basic Functions ..................................................................................................................................... 10
Table 4 Assets for User Data .................................................................................................................................... 23
Table 5 Assets for TSF Data ...................................................................................................................................... 24
Table 6 Other Assets .................................................................................................................................................... 24
Table 7 Threats to User Data and TSF Data ...................................................................................................... 26
Table 8 Organizational Security Policies .............................................................................................................. 27
Table 9 Assumptions .................................................................................................................................................... 27
Table 10 Security Objectives for the TOE ............................................................................................................ 28
Table 11 Security objectives for the environment ........................................................................................... 29
Table 12 Assumptions / Threats / Organizational Security policies and the Corresponding
Security Objectives .............................................................................................................................................. 30
Table 13 Security Objectives Rationale for Security Problem ...................................................................... 30
Table 14 Security functional Requirements ........................................................................................................ 40
Table 17 SFR Package attributes ............................................................................................................................ 52
Table 19 PRT Access Control SFP ............................................................................................................................ 54
Table 20 SCN Access Control SFP ........................................................................................................................... 55
Table 21 CPY Access Control SFP ............................................................................................................................ 55
Table 22 FAX Access Control SFP ............................................................................................................................ 56
Table 23 DSR Access Control SFP ........................................................................................................................... 56
Table 24 D.FUNC Operation List ............................................................................................................................. 57
- iii -