Advertisement

A consideration of the modes of operation for secure systems

  • C. L. Robinson
  • S. R. Wiseman
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 875)

Abstract

Secure systems are often characterised by a ‘mode of operation’. This acts as a shorthand for the degree of risk to the information on the system and the minimum security functionality required as a countermeasure. This paper examines the UK definitions of these modes and proposes a model of a system which can be used to capture the distinctions between them. The variations of possible secure system functionality within each mode are then discussed. Some new definitions, which are orthogonal to the modes of operation, are proposed which can be used to resolve ambiguities.

Keywords

Security Mode of Operation Dedicated System High Compartmented Multi-Level System Model Z Notation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    CESG Computer Security Memorandum 1, Glossary of Computer Security Terms, Issue 2.2, November 1993Google Scholar
  2. 2.
    Guidance for Applying the Department of Defense Trusted Computer System, Evaluation Criteria in Specific Environments, CSC-STD-003-85, June 1985Google Scholar
  3. 3.
    H O Lubbes: COMPUSEC, A Personal View, Proceedings of the 9th Annual Computer Security Applications Conference, Orlando, Florida, December 6–10, 1993Google Scholar
  4. 4.
    D E Bell, L J LaPadula: Secure Computer Systems: Mathematical Foundations, MTR-2547, Volume 1, November 1973; Secure Computer Systems: A Mathematical Model, MTR-2547 Volume II, November 1973; Secure Computer Systems: A Refinement of the Mathematical Model, MTR-2547 Volume III, April 1974; and Secure Computer System: Unified Exposition and Multics Interpretation, MTR-2997, January 1976Google Scholar
  5. 5.
    J M Spivey: The Z Notation: a Reference Manual, 2nd Edition, Prentice Hall International, 1992Google Scholar
  6. 6.
    S R Wiseman, C L Robinson and M M Adams: A Mathematical Definition of Access Control, DRA report DRA/CIS/CSE2/94007, April 1994Google Scholar
  7. 7.
    J A Goguen, J Meseguer: Security Policies and Security Models, Proceedings of the 1982 Symposium on Security and Privacy, Oakland, California, April 1982Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  • C. L. Robinson
    • 1
  • S. R. Wiseman
    • 1
  1. 1.Secure Information Systems GroupDefence Research AgencyMalvernUK

Personalised recommendations