|
|
|
|
|
|
|
|
|
¨ |
System
Security State is defined by
|
|
|
|
– |
Resources
that will be kept in a secure state
|
|
|
|
– |
Definition
of secure state for each resource
|
|
|
|
– |
Enumeration
of, or criteria for, secure states
|
|
|
– |
Active
entities that can cause changes in the
|
|
|
security
state of secured resources
|
|
|
|
– |
Enumeration
of, or allowed algorithms for,
|
|
|
|
transitions
among secure states
|
|