Map
Index
Random
Help
th

Quote: users must securely identify objects and actions; if not, an untrusted program can spoof a trusted one

topics > all references > references t-z > QuoteRef: yeeKP12_2002 , p. 287



Group:
security
Topic:
unique names

Quotation Skeleton

Principle of Identifiably. … When identity is threatened … the user is vulnerable to error. Identification has … different). … If an untrusted program can cause an object … it can produce confusion that has security consequences. … [p. 288] The same … identify and distinguish as objects.   Google-1   Google-2

Copyright clearance needed for quotation.

Additional Titles

Quote: identification requires continuity of identity and discrimination of distinct items

Related Topics up

Group: security   (23 topics, 802 quotes)
Topic: unique names (57 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.