19.06.2014 Views

Xerox WorkCentre 5632/5638/5645/5655 - Common Criteria

Xerox WorkCentre 5632/5638/5645/5655 - Common Criteria

Xerox WorkCentre 5632/5638/5645/5655 - Common Criteria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Xerox</strong> <strong>WorkCentre</strong> <strong>5632</strong>/<strong>5638</strong>/<strong>5645</strong>/<strong>5655</strong>/5665/5675/5687<br />

Multifunction Systems Security Target<br />

7. ACRONYMS<br />

The following acronyms are used in this Security Target:<br />

ACRONYM<br />

AUT<br />

CC<br />

CEM<br />

CM<br />

DES<br />

DH<br />

DMA<br />

EAL<br />

FDP<br />

FIA<br />

FMT<br />

FPT<br />

FSP<br />

HDD<br />

HLD<br />

IIO<br />

ISO<br />

IPSec<br />

ISO 15408<br />

IT<br />

MFD<br />

MOF<br />

MTD<br />

OCSP<br />

ODIO<br />

OSP<br />

PP<br />

PSTN<br />

RSA<br />

SA<br />

SAR<br />

SFP<br />

SFR<br />

DEFINITION<br />

Authentication<br />

<strong>Common</strong> <strong>Criteria</strong> for Information Technology Security Evaluation<br />

<strong>Common</strong> Evaluation Methodology for Information Technology<br />

Security<br />

Configuration Management<br />

Data Encryption Standard<br />

Diffie-Hellman<br />

Direct Memory Access<br />

Evaluation Assurance Level<br />

User Data Protection CC Class<br />

Identification and Authentication CC Class<br />

Security Management CC Class<br />

Protection of Security Functions<br />

Functional Specification<br />

Hard Disk Drive<br />

High Level Design<br />

Immediate Image Overwrite<br />

International Standards Organization<br />

Internet Protocol Security<br />

<strong>Common</strong> <strong>Criteria</strong> 2.2 ISO Standard<br />

Information Technology<br />

Multifunction Device<br />

Management of Functions<br />

Management of TSF Data<br />

Online Certificate Status Protocol<br />

On Demand Image Overwrite<br />

Organization Security Policy<br />

Protection Profile<br />

Publicly Switched Telephone Network<br />

Rivest-Shamir-Adleman<br />

System Administrator<br />

Security Assurance Requirement<br />

Security Function Policy<br />

Security Functional Requirement<br />

76<br />

Copyright 2009 <strong>Xerox</strong> Corporation, All rights reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!