Survivability strategy for a security critical process

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security critical processes in the context of this paper are considered information technology processes that are implemented to achieve a high level of integrity, authenticity and confidentiality of data processing. It ís a matter of fact that high-level security may only be achieved through adequate physical protection. The classical approach is to close away such processes in computing centers protected by physical barriers with high drag factors ñ well known to cause substantial investment and operational costs. This paper describes a new, recently patented method to protect such a security critical process by different means not to keep the attacker out but to take the valuables out when the attacker comes in. Practical application of this strategy is detailed giving an example of protecting a Trust Center of a Public Key Infrastructure by such means.

Cite

CITATION STYLE

APA

Dafelmair, F. J. (2002). Survivability strategy for a security critical process. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2434, pp. 61–69). Springer Verlag. https://doi.org/10.1007/3-540-45732-1_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free