There are two sides to every question. Controller versus attacker
From MaRDI portal
Publication:3460874
Recommendations
Cites work
- scientific article; zbMATH DE number 1884420 (Why is no real title available?)
- A quantitative study of two attacks
- Analysis of security protocols as open systems
- Compositionality Through an Operational Semantics of Contexts
- Enforceable Security Policies Revisited
- Model checking usage policies
- Quantitative \(\mu\)-calculus and CTL defined over constraint semirings
- Semiring-based constraint satisfaction and optimization
- Which security policies are enforceable by runtime monitors? A survey
This page was built for publication: There are two sides to every question. Controller versus attacker
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3460874)