Self-Star Properties
From CasGroup
(New page: '''Self-* properties''' refer to any properties or processes of a system which are caused and maintained by the system itself. They are an essential feature of living systems, a...) |
(→Self-Optimization and Self-Protection) |
||
| Line 93: | Line 93: | ||
One contradicting pair of self-* properties is self-optimization and self-protection. | One contradicting pair of self-* properties is self-optimization and self-protection. | ||
Self-protection requires high security, strong protection and high encryption, | Self-protection requires high security, strong protection and high encryption, | ||
| - | but high encryption in turn leads to | + | but high encryption in turn leads to low ease of use and high response or |
| - | high response or reaction times for a system. | + | reaction times for a system. |
| - | + | ||
It would require too much time and effort to treat everything as top secret | It would require too much time and effort to treat everything as top secret | ||
| - | with the highest possible protection. It would damage or endanger security | + | with the highest possible encryption and protection. It would damage or endanger security |
if nothing is really protected. Always highest encryption would take too much time | if nothing is really protected. Always highest encryption would take too much time | ||
| - | and effort, always lowest encryption would | + | and effort, always lowest encryption would threaten security. A tradeoff between |
| - | both sides often results in classification or security levels, for instance the | + | both sides often results in classification or [http://en.wikipedia.org/wiki/Classified_information security levels], |
| - | well-known classification Top secret, Secret, Confidential, and Restricted. | + | for instance the well-known classification Top secret, Secret, Confidential, and Restricted. |
=== Self-Optimization and Self-Reconfiguration === | === Self-Optimization and Self-Reconfiguration === | ||