Abstract
© 2003-2012 IEEE.In 1975, Saltzer and Schroeder (SS) elucidated eight design principles that shaped decades of security research and development.1 Some of them are listed as key tenets of security protocols2 in software design methodologies, such as Microsoft's Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege threat model,3,4 and in McGraw's 2004 article "Software Security" in IEEE Security Privacy.5
Original language | English |
---|---|
Article number | 8821456 |
Pages (from-to) | 90-93 |
Journal | IEEE Security and Privacy |
Volume | 17 |
Issue number | 5 |
DOIs | |
Publication status | Published - 1 Sept 2019 |
Externally published | Yes |