
Page 6 of 83
List of Figures
Figure 1: Environment for Usage of TOE..................................................................................................... 11
Figure 2: Hardware Configuration of TOE ................................................................................................... 13
Figure 3: Logical Scope of TOE ................................................................................................................... 19
Figure 4: Operation Panel (for North America) ............................................................................................ 20
List of Tables
Table 1: List of TOE........................................................................................................................................9
Table 2: List of Administrator Roles ............................................................................................................. 18
Table 3: Correspondence Table for Operation Permissions on Document Data and Operations on Document
Data............................................................................................................................................................... 23
Table 4: Relation between Security Environment and Security Objectives .................................................. 32
Table 5: List of Auditable Events.................................................................................................................. 36
Table 6: List of Cryptographic Key Generation............................................................................................ 41
Table 7: List of Cryptographic Operation ..................................................................................................... 41
Table 8: List of Subjects, Objects, and Operations among Subjects and Objects ......................................... 42
Table 9: Subjects, Objects and Security Attributes ....................................................................................... 42
Table 10: Rules Governing Access................................................................................................................ 43
Table 11: Rules Governing Access Explicitly ............................................................................................... 43
Table 12: List of Subjects, Information and Operation ................................................................................. 44
Table 13: Security Attributes Corresponding to Subjects or Information ..................................................... 44
Table 14: List of Authentication Events ........................................................................................................ 45
Table 15: Lockout Release Actions............................................................................................................... 45
Table 16: Rules for Initial Association of Attributes ..................................................................................... 47
Table 17: Management Roles of Security Attributes..................................................................................... 48
Table 18: Characteristics of Static Attribute Initialisation............................................................................. 49
Table 19: List of TSF Data Management ...................................................................................................... 49
Table 20: List of Specification of Management Functions............................................................................ 51
Table 21: Services Requiring Trusted Path ...................................................................................................55
Table 22: TOE Security Assurance Requirements (EAL3) ........................................................................... 56
Table 23: Relation between Security Objectives and Functional Requirements........................................... 57
Table 24: Correspondence Table of Dependencies of TOE Security Functional Requirements.................... 62
Table 25: Relation between TOE Security Functional Requirements and TOE Security Functions............. 65
Table 26: Auditable Events and Auditable Information ...........................................................................
..... 67
Table 27: User Roles and Authentication Methods ....................................................................................... 69
Table 28: Unlocking Administrators for Each User Role.............................................................................. 70
Table 29: Initial Value for Document Data ACL........................................................................................... 72
Table 30: Operations on the Document Data ACL and Authorised Operators .............................................. 72
Table 31: Access to Administrator Information............................................................................................. 73
Table 32: Authorised Operations on General User Information.................................................................... 74
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
Comentarios a estos manuales