There are two sides to every question. Controller versus attacker
DOI10.1007/978-3-319-25527-9_20zbMATH Open1434.68332OpenAlexW2330918191MaRDI QIDQ3460874FDOQ3460874
Authors: Fabio Martinelli, Ilaria Matteucci, Francesco Santini
Publication date: 8 January 2016
Published in: Programming Languages with Applications to Biology and Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-25527-9_20
Recommendations
Specification and verification (program logics, model checking, etc.) (68Q60) Logic in computer science (03B70) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Computer security (68M25)
Cites Work
- Title not available (Why is that?)
- Semiring-based constraint satisfaction and optimization
- A quantitative study of two attacks
- Compositionality Through an Operational Semantics of Contexts
- Quantitative \(\mu\)-calculus and CTL defined over constraint semirings
- Which security policies are enforceable by runtime monitors? A survey
- Enforceable Security Policies Revisited
- Model checking usage policies
- Analysis of security protocols as open systems
This page was built for publication: There are two sides to every question. Controller versus attacker
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3460874)