1. What are the conceptual differences between a reference validation mechanism, a trusted computing base, and the TOE Security Functions?
2. Choose a Common Criteria protection profile and a security target of a product that implements that profile (see the Common Criteria Web site [211]). Identify the differences between the PP and the ST that implements the PP