In 1975, Saltzer and Schroeder (SS) elucidated eight design principles that shaped decades of security research and development. Some of them are listed as key tenets of security protocols in software design methodologies, such as Microsoft's Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege threat model and in McGraw's 2004 article "Software Security" in IEEE Security Privacy. Are they still valid.
Is "deny Access" a Valid "fail-Safe Default" Principle for Building Security in Cyberphysical Systems? / Massacci, Fabio. - In: IEEE SECURITY & PRIVACY. - ISSN 1540-7993. - STAMPA. - 17:5(2019), pp. 90-93. [10.1109/MSEC.2019.2918820]
Is "deny Access" a Valid "fail-Safe Default" Principle for Building Security in Cyberphysical Systems?
Massacci Fabio
2019-01-01
Abstract
In 1975, Saltzer and Schroeder (SS) elucidated eight design principles that shaped decades of security research and development. Some of them are listed as key tenets of security protocols in software design methodologies, such as Microsoft's Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege threat model and in McGraw's 2004 article "Software Security" in IEEE Security Privacy. Are they still valid.File | Dimensione | Formato | |
---|---|---|---|
SPM-fail-safe-v7.pdf
accesso aperto
Tipologia:
Pre-print non referato (Non-refereed preprint)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
106.91 kB
Formato
Adobe PDF
|
106.91 kB | Adobe PDF | Visualizza/Apri |
08821456.pdf
Solo gestori archivio
Tipologia:
Versione editoriale (Publisher’s layout)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
134.44 kB
Formato
Adobe PDF
|
134.44 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione