Abstract
Secure systems are often characterised by a ‘mode of operation’. This acts as a shorthand for the degree of risk to the information on the system and the minimum security functionality required as a countermeasure. This paper examines the UK definitions of these modes and proposes a model of a system which can be used to capture the distinctions between them. The variations of possible secure system functionality within each mode are then discussed. Some new definitions, which are orthogonal to the modes of operation, are proposed which can be used to resolve ambiguities.
Chapter PDF
Similar content being viewed by others
Keywords
References
CESG Computer Security Memorandum 1, Glossary of Computer Security Terms, Issue 2.2, November 1993
Guidance for Applying the Department of Defense Trusted Computer System, Evaluation Criteria in Specific Environments, CSC-STD-003-85, June 1985
H O Lubbes: COMPUSEC, A Personal View, Proceedings of the 9th Annual Computer Security Applications Conference, Orlando, Florida, December 6–10, 1993
D E Bell, L J LaPadula: Secure Computer Systems: Mathematical Foundations, MTR-2547, Volume 1, November 1973; Secure Computer Systems: A Mathematical Model, MTR-2547 Volume II, November 1973; Secure Computer Systems: A Refinement of the Mathematical Model, MTR-2547 Volume III, April 1974; and Secure Computer System: Unified Exposition and Multics Interpretation, MTR-2997, January 1976
J M Spivey: The Z Notation: a Reference Manual, 2nd Edition, Prentice Hall International, 1992
S R Wiseman, C L Robinson and M M Adams: A Mathematical Definition of Access Control, DRA report DRA/CIS/CSE2/94007, April 1994
J A Goguen, J Meseguer: Security Policies and Security Models, Proceedings of the 1982 Symposium on Security and Privacy, Oakland, California, April 1982
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Robinson, C.L., Wiseman, S.R. (1994). A consideration of the modes of operation for secure systems. In: Gollmann, D. (eds) Computer Security — ESORICS 94. ESORICS 1994. Lecture Notes in Computer Science, vol 875. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58618-0_73
Download citation
DOI: https://doi.org/10.1007/3-540-58618-0_73
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-58618-0
Online ISBN: 978-3-540-49034-0
eBook Packages: Springer Book Archive