
Fuji Xerox C2265/C2263
Security Target
- 77 -
Copyright
2016 by Fuji Xerox Co., Ltd
- the roles listed in Table 30
Table 30 Security Attributes and Authorized Roles (FAX)
Security Attributes
Operation
Roles
Key operator identifier
modify
Key Operator
SA identifier
query, modify
delete, creation
U.ADMINISTRATOR
General user identifier
query, modify
delete, creation
U.ADMINISTRATOR
Owner identifier of D.DOC (own
document data in Mailbox)
query, delete,
creation
U.USER
Owner identifier of D.DOC (all
document data in Mailbox)
query, delete
Key Operator
Owner identifier of D.FUNC (Personal
Mailbox)
query, delete,
creation
U.NORMAL, SA
Owner identifier of D.FUNC (Personal
Mailbox)
query, delete
Key Operator
Owner identifier of D.FUNC (Shared
Mailbox)
query, delete,
creation
Key Operator
FMT_MSA.1 (g)
Management of security attributes
Hierarchical to:
No other components.
Dependencies: [FDP_ACC.1
Subset access control, or
FDP_IFC.1 Subset information flow control]
FMT_SMR.1 Security roles
FMT_SMF.1
Specification
of Management Functions
FMT_MSA.1.1 (g)
The TSF shall enforce the [assignment: access control SFP(s),
information flow control SFP(s)] to restrict the ability to [selection:
change default, query, modify, delete, [assignment: other
operations]] the security attributes [assignment: list of security
attributes] to [assignment: the authorized identified roles].
[assignment: access control SFP(s), information flow control SFP(s)]
- DSR Access Control SFP in Table 23
[selection: change default, query, modify, delete, [assignment: other
operations]]
- query, modify ,delete,[assignment: other operations]
[assignment: other operations]
-
Creation
[assignment: list of security attributes]