Title : 
Operations with Degraded Security
         
        
            Author : 
Garfinkel, Simson L. ; Dinolt, George
         
        
        
        
        
        
        
            Abstract : 
Modern systems aren´t designed to support some ongoing operations after their security is compromised. Using the ResiliNets model, the authors discuss five strategies for operating in a degraded security environment.
         
        
            Keywords : 
security of data; ResiliNets model; degraded security environment; degraded security operation; Network security; Privacy; Resilience; DoD Instruction 8500.2; Insecurity; ResiliNets; battleshort; degraded security;
         
        
        
            Journal_Title : 
Security & Privacy, IEEE
         
        
        
        
        
            DOI : 
10.1109/MSP.2011.149