Reference from ESORICS proceedings

Third European Symposium on Research in Computer Security (ESORICS 94)

A Consideration of the Modes of Operation for Secure Systems

C. L. Robinson, S. R. Wiseman

Keywords : Security mode of operation, Dedicated, System high, Compartmented, Multi-level, System model, Z notation

Abstract : Secure systems are often characterised by a 'mode of operation'. This acts as a shorthand for the degree of risk to the information on the system and the minimum security functionality required as a countermeasure. This paper examines the UK definitions of these modes and proposes a model of a system which can be used to capture the distinctions between them. The variations of possible secure system functionality within each mode are then discussed. Some new definitions, which are orthogonal to the modes of operation, are proposed which can be used to resolve ambiguities.

(Pages 333-356)

Proceedings table of contents