![]() In 1974, Jerome Saltzer wrote an article outlining the security mechanisms in the Multics system (Saltzer, 1974). The Multics time-sharing system (Figure 1 – photo by Tom Van Vleck) was an early multi-user system that put significant effort into ensuring security. Many of us receive it from colleagues or through readings and textbooks. Not everyone is old enough or fortunate enough to have encountered this legacy first-hand by working on groundbreaking developments. The information security community has a rich legacy of wisdom drawn from earlier work and from sharp observations. , “A Contemporary Look at Saltzer and Schroeder’s 1975 Design Principles,” Security & Privacy, IEEE , vol.10, no.6, pp.20-25, Nov.-Dec. Here is the citation for the published article: I have added an Afterword to note a ninth security principle added to the second edition of my textbook Elementary Information Security. This version specifically identifies all of the textbooks I reviewed while looking at information security design principles. This is an extended, less-edited version of an article appearing in IEEE Security and Privacy in December 2012. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |