Samsung Multifunction MultiXpress X4220, X4250, X4300, X401, K4250, K4300, K4350, K401 Series
19
Copyright
2014 SAMSUNG ELECTRONICS Co., Ltd., All rights reserved
1.5
Conventions
This section describes the conventions used to denote Common Criteria (CC) operations on
security functional components and to distinguish text with special meaning. The notation,
formatting, and conventions used in this ST are largely consistent with those used in the CC.
Four presentation choices are discussed here.
Refinement
The refinement operation is used to add detail to a requirement, and, thus, further restricts
a requirement. Refinement of security requirements is denoted by
bold text.
Selection
The selection operation is used to select one or more options provided by the CC in
stating a requirement. Selections are denoted by
underlined italicized text
.
Assignment
The assignment operation is used to assign a specific value to an unspecified parameter
such as the length of a password. Showing the value in square brackets
[assignment_value(s)] indicates an assignment.
Iteration
Iterated functional components are given unique identifiers by appending to the
component name, short name, and functional element name from the CC an iteration
number inside parenthesis, for example, FIA_AFL.1 (1) and FIA_AFL.1 (2).
The following is notational conventions used by the PP:
The following prefixes in Table 4 are used to indicate different entity types
:
Table 4: Notational Prefix Conventions
Prefix
Type of Entity
U.
User
D.
Data
F.
Function
T.
Threat
P.
Policy
A.
Assumption
O.
Objective
OE.
Environmental objective
+
Security attribute
The following is an additional convention used to denote this Security Target:
Application Note