Operations with Degraded Security

Abstract

Modern systems aren't designed to support some ongoing operations after their security is compromised. Using the ResiliNets model, the authors discuss five strategies for operating in a degraded security environment. 
DOI: 10.1109/MSP.2011.149

Cite this paper

@article{Garfinkel2011OperationsWD, title={Operations with Degraded Security}, author={Simson L. Garfinkel and George W. Dinolt}, journal={IEEE Security & Privacy}, year={2011}, volume={9}, pages={43-48} }