Principles are based on scientific sources.
Name | Trusted Path |
Sources | (Yee, 2002) |
Synonyms | None |
Intent | The interface must provide an unspoofable and faithful communication channel between the user and any entity trusted to manipulate authorities on the user’s behalf. |
Motivation | The most important input and output channels are those used to manipulate authorities; if these channels can be spoofed or corrupted, the system has a security vulnerability. |
Examples | None |
Guidelines | None |
Tags | Integrity, Confidentiality |
Log history | [02/14/2016]: Added to repository |
Yee, K.-P., 2002. User interaction design for secure systems, in: Proceedings of the 4th International Conference on Information and Communications Security, ICICS ’02. Springer-Verlag, London, UK, UK, pp. 278–290.