Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 31, 2004 - Issue 11
14
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

The Twelve Principles of Trusted Solutions

 

Abstract

In what follows, we discuss aspects that would make a security solution work in practice. Experience shows that adding security components does not necessarily raise the level of trust of a security solution. Some of the questions we try to answer include: Is my security solution sufficiently complete to work in a real and living IT environment? How do I make my solution trustworthy? With these arrows in hand, we pursue the target of building a trusted solution by considering several trust principles.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.