Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 31, 2004 - Issue 11
14
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

The Twelve Principles of Trusted Solutions

Notes

  • Viega , J. and McGraw , G. 2001 . Building Secure Software , Addison-Wesley Professional Computing Series .
  • Schneier , Bruce . April 12, 1999 . Flaws in Cryptographic Systems ,
  • Brooks Jr. 1995 . Frederic, The Mythical Man-Month: Essays On Software Engineering, , 2nd ed. , Reading, MA : Addison-Wesley .
  • Thompson , K. L. 1984 . Reflections on trusting trust . Commun. ACM , 27 ( 8 ) August : 761 – 763 .
  • ITU-T Recommendation X.509 specification.
  • Browne , H. , Arbaugh , W. A. , McHugh , J. and Fithen , W. L. May 2001 . “ A Trend Analysis of Exploitations ” . In Proceedings of the 2001 IEEE Symposium on Security and Privacy May , 214 – 229 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.