Table 36 Operation of TSF Data ............................................................................................................................. 84
Table 37 Operation of TSF Data ............................................................................................................................. 86
Table 38 Security Management Functions Provided by TSF ....................................................................... 86
Table 46 Access Control for User Data .............................................................................................................. 115
Table 47 Details of Security Audit Log .............................................................................................................. 120