Shopping Cart

No products in the cart.

IEEE 2600.3-2009

$134.33

IEEE Standard Protection Profile for Hardcopy Devices in IEEE Std 2600-2008 Operational Environment C

Published By Publication Date Number of Pages
IEEE 2009 45
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Inactive-Reserved. Standard for a Protection Profile for Hardcopy Devices in a public-facing environment in which document security is not guaranteed, but access control and usage accounting are important to the operator of the environment. A retail copy center, public library, Internet café, and hotel business center are typical applications of this environment. This environment will be known as “Operational Environment C.”

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 2600.3-2009 Front Cover
3 Title Page
4 Abstract/Keywords
6 Introduction
For more information
Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents
7 Errata
Interpretations
Patents
Participants
8 Acknowledgments
9 Contents
11 Important Notice
1. Overview
1.1 Scope
1.2 Purpose
1.3 Application notes
12 1.4 Notational conventions
2. Normative references
13 3. Protection Profile introduction (APE_INT)
3.1 Protection Profile usage
3.2 Protection Profile reference
4. Hardcopy Device overview (APE_INT)
4.1 Typical products
14 4.2 Typical usage
5. TOE Overview (APE_INT)
5.1 TOE functions
15 5.2 TOE model
16 5.3 Entity definitions
18 5.4 TOE operational model
19 6. Conformance claims (APE_CCL)
6.1 Conformance to Common Criteria
6.2 Conformance to other Protection Profiles
6.3 Conformance to Packages
6.4 Conformance to this Protection Profile
20 7. Security Problem Definition (APE_SPD)
7.1 Threats agents
7.2 Threats to TOE Assets
7.3 Organizational Security Policies for the TOE
21 7.4 Assumptions
8. Security Objectives (APE_OBJ)
8.1 Security Objectives for the TOE
8.2 Security Objectives for the IT environment
22 8.3 Security Objectives for the non-IT environment
8.4 Security Objectives rationale
25 9. Extended components definition (APE_ECD)
9.1 FPT_FDI_EXP Restricted forwarding of data to external interfaces
27 10. Common Security Functional Requirements (APE_REQ)
10.1 Class FAU: Security audit
28 10.2 Class FCO: Communication
10.3 Class FCS: Cryptographic support
29 10.4 Class FDP: User Data protection
10.5 Class FIA: Identification and authentication
31 10.6 Class FMT: Security management
32 10.7 Class FPR: Privacy
10.8 Class FPT: Protection of the TSF
33 10.9 Class FRU: Resource utilization
10.10 Class FTA: TOE access
10.11 Class FTP: Trusted paths/channels
10.12 Common security requirements rationale
36 11. Security Assurance Requirements (APE_REQ)
12. SFR Packages introduction
12.1 SFR Packages usage
37 12.2 SFR Packages reference
12.3 SFR Package functions
12.4 SFR Package attributes
38 13. 2600.3-SMI SFR Package for Hardcopy Device Shared-medium Interface Functions, Operational Environment C
13.1 SMI SFR Package introduction
13.2 Class FAU: Security audit
39 13.3 Class FPT: Protection of the TSF
13.4 Class FTP: Trusted paths/channels
40 13.5 SMI security requirements rationale
41 Annex A (normative) Glossary
44 Annex B (normative) Acronyms
45 Annex C (informative) Bibliography
IEEE 2600.3-2009
$134.33