Principles are based on scientific sources.
| Name | Trusted Path |
| Sources | (Yee, 2002) |
| Synonyms | None |
| Intent | The interface must provide an unspoofable and faithful communication channel between the user and any entity trusted to manipulate authorities on the user’s behalf. |
| Motivation | The most important input and output channels are those used to manipulate authorities; if these channels can be spoofed or corrupted, the system has a security vulnerability. |
| Examples | None |
| Guidelines | None |
| Tags | Integrity, Confidentiality |
| Log history | [02/14/2016]: Added to repository |
Yee, K.-P., 2002. User interaction design for secure systems, in: Proceedings of the 4th International Conference on Information and Communications Security, ICICS ’02. Springer-Verlag, London, UK, UK, pp. 278–290.