Abstract
© 2003-2012 IEEE.In 1975, Saltzer and Schroeder (SS) elucidated eight design principles that shaped decades of security research and development.1 Some of them are listed as key tenets of security protocols2 in software design methodologies, such as Microsoft's Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege threat model,3,4 and in McGraw's 2004 article "Software Security" in IEEE Security Privacy.5
Original language | English |
---|---|
Article number | 8821456 |
Pages (from-to) | 90-93 |
Journal | IEEE Security and Privacy |
Volume | 17 |
Issue number | 5 |
DOIs | |
Publication status | Published - 1 Sept 2019 |
Externally published | Yes |
Funding
I would like to thank Richard Clay- ton, Sandro Etalle, Virgil Gligor, and Mike Schroeder for their use ful comments that greatly improved this article. Any remaining error is mine. This work is partly supported by European Union Horizon 2020 grant 830929, CyberSec4Europe (www.cybersec4europe.eu) grant 770138, and the Observation Plat form for Technological and Institu tional Consolidation of Research in Safety 2 project (www.optics-project .eu).
Funders | Funder number |
---|---|
Observation Plat form for Technological and Institu tional Consolidation of Research in Safety 2 | |
Horizon 2020 Framework Programme | |
Horizon 2020 | 770138, 830929 |