Operating instructions

CRP-C0266-01
42
12. Bibliography
[1] IT Security Evaluation and Certification Scheme, May 2007,
Information-technology Promotion Agency, Japan CCS-01
[2] IT Security Certification Procedure, May 2007,
Information-technology Promotion Agency, Japan CCM-02
[3] Evaluation Facility Approval Procedure, May 2007,
Information-technology Promotion Agency, Japan CCM-03
[4] Common Criteria for Information Technology Security Evaluation Part1:
Introduction and general model Version 3.1 Revision 1, September 2006,
CCMB-2006-09-001
[5] Common Criteria for Information Technology Security Evaluation Part2:
Security functional components Version 3.1 Revision 2, September 2007,
CCMB-2007-09-002
[6] Common Criteria for Information Technology Security Evaluation Part3:
Security assurance components Version 3.1 Revision 2, September 2007,
CCMB-2007-09-003
[7] Common Criteria for Information Technology Security Evaluation Part 1:
Introduction and general model Version 3.1 Revision 1, September 2006,
CCMB-2006-09-001 (Japanese Version 1.2, March 2007)
[8] Common Criteria for Information Technology Security Evaluation Part 2:
Security functional components Version 3.1 Revision 2, September 2007,
CCMB-2007-09-002 (Japanese Version 2.0, March 2008)
[9] Common Criteria for Information Technology Security Evaluation Part 3:
Security assurance components Version 3.1 Revision 2, September 2007,
CCMB-2007-09-003 (Japanese Version 2.0, March 2008)
[10] Common Methodology for Information Technology Security Evaluation:
Evaluation Methodology Version 3.1 Revision 2, September 2007,
CCMB-2007-09-004
[11] Common Methodology for Information Technology Security Evaluation:
Evaluation Methodology Version 3.1 Revision 2, September 2007,
CCMB-2007-09-004 (Japanese Version 2.0, March 2008)
[12] Aficio MP C2800/C3300 series with Fax Option Type C5000 Security Target
Version 1.00 (July 29, 2010) RICOH COMPANY, Ltd.
[13] RICOH COMPANY, Ltd. Aficio MP C2800/3300 series with Fax Option Type
C5000 Evaluation Technical Report Version 1.4, July 29, 2010, Information
Technology Security Center Evaluation Department