In 1975, Saltzer and Schroeder (SS) elucidated eight design principles that shaped decades of security research and development. Some of them are listed as key tenets of security protocols in software design methodologies, such as Microsoft's Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege threat model and in McGraw's 2004 article "Software Security" in IEEE Security Privacy. Are they still valid.

Is "deny Access" a Valid "fail-Safe Default" Principle for Building Security in Cyberphysical Systems? / Massacci, Fabio. - In: IEEE SECURITY & PRIVACY. - ISSN 1540-7993. - STAMPA. - 17:5(2019), pp. 90-93. [10.1109/MSEC.2019.2918820]

Is "deny Access" a Valid "fail-Safe Default" Principle for Building Security in Cyberphysical Systems?

Massacci Fabio
2019-01-01

Abstract

In 1975, Saltzer and Schroeder (SS) elucidated eight design principles that shaped decades of security research and development. Some of them are listed as key tenets of security protocols in software design methodologies, such as Microsoft's Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege threat model and in McGraw's 2004 article "Software Security" in IEEE Security Privacy. Are they still valid.
2019
5
Massacci, Fabio
Is "deny Access" a Valid "fail-Safe Default" Principle for Building Security in Cyberphysical Systems? / Massacci, Fabio. - In: IEEE SECURITY & PRIVACY. - ISSN 1540-7993. - STAMPA. - 17:5(2019), pp. 90-93. [10.1109/MSEC.2019.2918820]
File in questo prodotto:
File Dimensione Formato  
SPM-fail-safe-v7.pdf

accesso aperto

Tipologia: Pre-print non referato (Non-refereed preprint)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 106.91 kB
Formato Adobe PDF
106.91 kB Adobe PDF Visualizza/Apri
08821456.pdf

Solo gestori archivio

Tipologia: Versione editoriale (Publisher’s layout)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 134.44 kB
Formato Adobe PDF
134.44 kB Adobe PDF   Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/251142
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 2
social impact