A consideration of the modes of operation for secure systems
Secure systems are often characterised by a ‘mode of operation’. This acts as a shorthand for the degree of risk to the information on the system and the minimum security functionality required as a countermeasure. This paper examines the UK definitions of these modes and proposes a model of a system which can be used to capture the distinctions between them. The variations of possible secure system functionality within each mode are then discussed. Some new definitions, which are orthogonal to the modes of operation, are proposed which can be used to resolve ambiguities.
KeywordsSecurity Mode of Operation Dedicated System High Compartmented Multi-Level System Model Z Notation
Unable to display preview. Download preview PDF.
- 1.CESG Computer Security Memorandum 1, Glossary of Computer Security Terms, Issue 2.2, November 1993Google Scholar
- 2.Guidance for Applying the Department of Defense Trusted Computer System, Evaluation Criteria in Specific Environments, CSC-STD-003-85, June 1985Google Scholar
- 3.H O Lubbes: COMPUSEC, A Personal View, Proceedings of the 9th Annual Computer Security Applications Conference, Orlando, Florida, December 6–10, 1993Google Scholar
- 4.D E Bell, L J LaPadula: Secure Computer Systems: Mathematical Foundations, MTR-2547, Volume 1, November 1973; Secure Computer Systems: A Mathematical Model, MTR-2547 Volume II, November 1973; Secure Computer Systems: A Refinement of the Mathematical Model, MTR-2547 Volume III, April 1974; and Secure Computer System: Unified Exposition and Multics Interpretation, MTR-2997, January 1976Google Scholar
- 5.J M Spivey: The Z Notation: a Reference Manual, 2nd Edition, Prentice Hall International, 1992Google Scholar
- 6.S R Wiseman, C L Robinson and M M Adams: A Mathematical Definition of Access Control, DRA report DRA/CIS/CSE2/94007, April 1994Google Scholar
- 7.J A Goguen, J Meseguer: Security Policies and Security Models, Proceedings of the 1982 Symposium on Security and Privacy, Oakland, California, April 1982Google Scholar