Information technology. Security techniques. Evaluation criteria for IT security. Security functional requirements Part 2, (15th February 2000)