 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
¨ |
Operations
that each subsystem performs as part
|
|
|
|
of
TOE security function realization
|
|
|
¨ |
Relationship
between subsystems and security
|
|
|
|
functions
may be many-to-many
|
|
|
|
– |
One
subsystem may wholly realize many security
|
|
|
|
functions
|
|
|
|
– |
Aspects
of one security function may be realized
|
|
|
|
through
the cooperation of many subsystems
|
|
|
¨ |
“TSP-enforcing
subsystem” directly or indirectly
|
|
|
contibutes
to TSP enforcement
|
|