13.5 Further Reading
Many papers discuss the application of these principles to security mechanisms. Succeeding chapters will present references for this aspect of the principles. Other papers present different sets of principles. These papers are generally specializations or alternative views of Saltzer and Schroeder's principles, tailored for particular environments. Abadi and Needham  and Anderson and Needham  discuss principles for the design of cryptographic protocols; Syverson discusses their limits . Moore  and Abadi  describe problems in cryptographic protocols. Wood [1057, 1058] discusses principles for secure systems design with an emphasis on groupware. Bonyun  focuses on architectural principles. Landwehr and Goldschlag  present principles for Internet security.