
Page 44 of 83
Hierarchical to: No other components.
Dependencies: FDP_IFF.1 Simple security attributes.
FDP_IFC.1.1 The TSF shall enforce the [assignment: telephone line information flow SFP] on
[assignment: subjects, information, and an operation listed in
Table 12].
Table 12: List of Subjects, Information and Operation
Subjects Information Operation
- Fax process on Fax Unit
- Fax reception process on Controller Board
Received data from a telephone
line
Transferring
(Notes: Transferring means that the Controller Board receives the data, which is received from a
telephone line, from Fax Unit.)
FDP_IFF.1 Simple security attributes
Hierarchical to: No other components.
Dependencies: FDP_IFC.1 Subset information flow control
FMT_MSA.3 Static attribute initialisation.
FDP_IFF.1.1 The TSF shall enforce the [assignment: telephone line information flow SFP] based on the
following types of subject and information security attributes: [assignment: subjects or
information and their corresponding security attributes shown in
Table 13].
Table 13: Security Attributes Corresponding to Subjects or Information
Types Subjects or information Security attributes
Subject Fax process on Fax Unit No security attributes
Subject Fax reception process on Controller Board No security attributes
Information Received data from a telephone line Data type
(Notes: Data type is the type of data received from a telephone line and indicates either the fax data or
non-fax data.)
FDP_IFF.1.2 The TSF shall permit an information flow between a controlled subject and controlled
information via a controlled operation if the following rules hold: [assignment: after the
type of received data from a telephone line is recognized as the fax data, the fax process
on the Fax Unit allows the fax reception process on the Controller Board to let the
received data from a telephone line pass].
FDP_IFF.1.3 The TSF shall enforce the [assignment: no additional information flow control SFP
rules].
FDP_IFF.1.4 The TSF shall explicitly authorise an information flow based on the following rules:
[assignment: no rules, based on security attributes, that explicitly authorise information
flows].
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
Kommentare zu diesen Handbüchern