Fuji Xerox C2265 Manual page 5

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

Table 33 Initialization property .............................................................................................................................. 79
Table 34 Initialization property .............................................................................................................................. 81
Table 35 Initialization property .............................................................................................................................. 84
Table 36 Operation of TSF Data ............................................................................................................................. 84
Table 37 Operation of TSF Data ............................................................................................................................. 86
Table 38 Security Management Functions Provided by TSF ....................................................................... 86
Table 39 Security Assurance Requirements ........................................................................................................ 93
Table 40 Security Functional Requirements and the Corresponding Security Objectives ................ 94
Table 41 Security Objectives to SFR Rationale .................................................................................................. 96
Table 42 Dependencies of Functional Security Requirements ................................................................. 103
Table 43 Security Functional Requirements and the Corresponding TOE Security Functions ..... 108
Table 44 Management of security attributes ................................................................................................. 113
Table 45 Access Control for Basic Functions ................................................................................................... 115
Table 46 Access Control for User Data .............................................................................................................. 115
Table 47 Details of Security Audit Log .............................................................................................................. 120
- iv -

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents