Operations with Degraded Security


Modern systems aren't designed to support some ongoing operations after their security is compromised. Using the ResiliNets model, the authors discuss five strategies for operating in a degraded security environment. 
DOI: 10.1109/MSP.2011.149

Cite this paper

@article{Garfinkel2011OperationsWD, title={Operations with Degraded Security}, author={Simson L. Garfinkel and George W. Dinolt}, journal={IEEE Security & Privacy}, year={2011}, volume={9}, pages={43-48} }