IEEE 2600.3-2009
$134.33
IEEE Standard Protection Profile for Hardcopy Devices in IEEE Std 2600-2008 Operational Environment C
Published By | Publication Date | Number of Pages |
IEEE | 2009 | 45 |
New IEEE Standard – Inactive-Reserved. Standard for a Protection Profile for Hardcopy Devices in a public-facing environment in which document security is not guaranteed, but access control and usage accounting are important to the operator of the environment. A retail copy center, public library, Internet café, and hotel business center are typical applications of this environment. This environment will be known as “Operational Environment C.”
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 2600.3-2009 Front Cover |
3 | Title Page |
4 | Abstract/Keywords |
6 | Introduction For more information Notice to users Laws and regulations Copyrights Updating of IEEE documents |
7 | Errata Interpretations Patents Participants |
8 | Acknowledgments |
9 | Contents |
11 | Important Notice 1. Overview 1.1 Scope 1.2 Purpose 1.3 Application notes |
12 | 1.4 Notational conventions 2. Normative references |
13 | 3. Protection Profile introduction (APE_INT) 3.1 Protection Profile usage 3.2 Protection Profile reference 4. Hardcopy Device overview (APE_INT) 4.1 Typical products |
14 | 4.2 Typical usage 5. TOE Overview (APE_INT) 5.1 TOE functions |
15 | 5.2 TOE model |
16 | 5.3 Entity definitions |
18 | 5.4 TOE operational model |
19 | 6. Conformance claims (APE_CCL) 6.1 Conformance to Common Criteria 6.2 Conformance to other Protection Profiles 6.3 Conformance to Packages 6.4 Conformance to this Protection Profile |
20 | 7. Security Problem Definition (APE_SPD) 7.1 Threats agents 7.2 Threats to TOE Assets 7.3 Organizational Security Policies for the TOE |
21 | 7.4 Assumptions 8. Security Objectives (APE_OBJ) 8.1 Security Objectives for the TOE 8.2 Security Objectives for the IT environment |
22 | 8.3 Security Objectives for the non-IT environment 8.4 Security Objectives rationale |
25 | 9. Extended components definition (APE_ECD) 9.1 FPT_FDI_EXP Restricted forwarding of data to external interfaces |
27 | 10. Common Security Functional Requirements (APE_REQ) 10.1 Class FAU: Security audit |
28 | 10.2 Class FCO: Communication 10.3 Class FCS: Cryptographic support |
29 | 10.4 Class FDP: User Data protection 10.5 Class FIA: Identification and authentication |
31 | 10.6 Class FMT: Security management |
32 | 10.7 Class FPR: Privacy 10.8 Class FPT: Protection of the TSF |
33 | 10.9 Class FRU: Resource utilization 10.10 Class FTA: TOE access 10.11 Class FTP: Trusted paths/channels 10.12 Common security requirements rationale |
36 | 11. Security Assurance Requirements (APE_REQ) 12. SFR Packages introduction 12.1 SFR Packages usage |
37 | 12.2 SFR Packages reference 12.3 SFR Package functions 12.4 SFR Package attributes |
38 | 13. 2600.3-SMI SFR Package for Hardcopy Device Shared-medium Interface Functions, Operational Environment C 13.1 SMI SFR Package introduction 13.2 Class FAU: Security audit |
39 | 13.3 Class FPT: Protection of the TSF 13.4 Class FTP: Trusted paths/channels |
40 | 13.5 SMI security requirements rationale |
41 | Annex A (normative) Glossary |
44 | Annex B (normative) Acronyms |
45 | Annex C (informative) Bibliography |