Xerox Multi-Function Device Security Target
21
Copyright
2013 Xerox Corporation. All rights reserved.
Note:
IEEE Std. 2600.2-2009 defines D.PROT and D.CONF, and requires
the ST author to categorize all TSF data as one of these two types:
1.
TSF Protected Data.
Data that should be protected, but does not
affect the operational security of the TOE if it is disclosed (D.PROT).
2.
TSF Confidential Data.
Data that does affect the operational security
of the TOE if it is disclosed (D.CONF).
3.1.2.3. Functions
Functions perform processing, storage, and transmission of data that may be
present in Hardcopy Device (HCD) products. These functions are used by
SFR packages, and are identified and defined in Table 11 below.
Table 11: SFR package functions for IEEE Std. 2600.2-2009
Designation Definition
F.PRT
Printing: a function in which electronic document input is converted to
physical document output
F.SCN
Scanning: a function in which physical document input is converted to
electronic document output
F.CPY
Copying: a function in which physical document input is duplicated to
physical document output
F.FAX
Faxing: a function in which physical document input is converted to a
telephone-based document facsimile (fax) transmission, and a function in
which a telephone-based document facsimile (fax) reception is converted
to physical document output
F.DSR
Document storage and retrieval: a function in which a document is stored
during one job and retrieved during one or more subsequent jobs
F.SMI
Shared-medium interface: a function that transmits or receives User Data
or TSF Data over a communications medium which, in conventional
practice, is or can be simultaneously accessed by multiple users, such as
wired network media and most radio-frequency wireless media
3.1.3.
Operations
Operations are a specific type of action performed by a Subject on an Object.
In this Security Target, five types of operations are considered: those that
result in disclosure of information (Read), those that result in alteration of
information (Create, Modify, Delete), and those that invoke a function
(Execute).
3.1.4.
Channels
Channels are the mechanisms through which data can be transferred into
and out of the TOE. In this Security Target, four types of Channels are
allowed: