Trusted Path

Name Trusted Path
Sources (Yee, 2002)
Synonyms None
Intent The interface must provide an unspoofable and faithful communication channel between the user and any entity trusted to manipulate authorities on the user’s behalf.
Motivation The most important input and output channels are those used to manipulate authorities; if these channels can be spoofed or corrupted, the system has a security vulnerability.
Examples None
Guidelines None
Tags Integrity, Confidentiality
Log history [02/14/2016]: Added to repository

References

Yee, K.-P., 2002. User interaction design for secure systems, in: Proceedings of the 4th International Conference on Information and Communications Security, ICICS ’02. Springer-Verlag, London, UK, UK, pp. 278–290.