TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. Do not model the attacker (transcript of discussion)
 
Options

Do not model the attacker (transcript of discussion)

Publikationstyp
Conference Paper
Date Issued
2011-07-18
Sprache
English
Author(s)
Meier, Jan  
Sicherheit in verteilten Anwendungen E-15 (H)  
TORE-URI
https://hdl.handle.net/11420/45921
First published in
Lecture notes in computer science  
Number in series
6615
Start Page
36
End Page
37
Citation
16th International Workshop on Security Protocols (2008)
Contribution to Conference
16th International Workshop on Security Protocols 2008  
Publisher DOI
10.1007/978-3-642-22137-8_6
Scopus ID
2-s2.0-79960216537
Publisher
Springer
ISBN
978-3-642-22136-1
Tuomas Aura: You criticised the fact that tools have built in assumptions, but this depends on the tool user. If you think of things such as program-defining tools, or program checkers, something that you want someone to use over and over again, they should do things automatically, and get it right most of the time. In that case you don't want the user to start to model the assumptions, or the security protocols, but you instead want these to be built in, in all possible combinations.
DDC Class
004: Computer Sciences
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback