Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

1 Introduction
1.1 Identification of Protection Profile
1.2 Protection Profile Overview
2 Target of Evaluation (TOE) Description
2.1 Product Type
2.2 General Features - Core Requirements
2.3 Authentication Packages
3 Security Environment
3.1 IT Assets
3.2 Threats
3.3 Organisational Security Policies
3.4 Assumptions
4 Security Objectives
4.1 TOE Security Objectives
4.2 Environmental Security Objectives
5 Security Requirements
5.1 TOE IT Security Functional Requirements - Core Requirements
5.2 TOE IT Security Requirements - OSAuthentication
5.3 TOE IT Security Requirements - DatabaseAuthentication
5.4 IT Assurance Requirements
5.8 Minimum Strength of Function
6 Rationale
6.1 Security Objectives Rationale
6.2 Security Requirements Rationale - Core Services
6.3 Security Requirements Rationale - OS Authentication
6.4 Security Requirements Rationale - Database Authentication
6.5 Assumptions Rationale
6.6 Strength of Functions Rationale
6.7 Security Assurance Rationale
7 Application Notes
7.1 Intended use of this PP
AReferences
BGlossary
0 of .
Results for:
No results containing your search query
P. 1
dbms

dbms

Ratings:

4.0

(1)
|Views: 36|Likes:
Published by Kiran Reddy
dbms
dbms

More info:

Published by: Kiran Reddy on Jan 22, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/10/2014

pdf

text

original

You're Reading a Free Preview
Pages 5 to 48 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->