A consideration of the modes of operation for secure systems

  • Robinson C
  • Wiseman S
N/ACitations
Citations of this article
22Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Secure systems are often characterised by a ‘mode of operation’. This acts as a shorthand for the degree of risk to the information on the system and the minimum security functionality required as a countermeasure. This paper examines the UK definitions of these modes and proposes a model of a system which can be used to capture the distinctions between them. The variations of possible secure system functionality within each mode are then discussed. Some new definitions, which are orthogonal to the modes of operation, are proposed which can be used to resolve ambiguities.

Cite

CITATION STYLE

APA

Robinson, C. L., & Wiseman, S. R. (1994). A consideration of the modes of operation for secure systems (pp. 335–356). https://doi.org/10.1007/3-540-58618-0_73

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free