The Casino and the OODA Loop

Why Our Protocols Always Eventually Fail
  • Sandy Clark
  • Matt Blaze
  • Jonathan M. Smith
Conference paper

DOI: 10.1007/978-3-642-35694-0_8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7622)
Cite this paper as:
Clark S., Blaze M., Smith J.M. (2012) The Casino and the OODA Loop. In: Christianson B., Malcolm J., Stajano F., Anderson J. (eds) Security Protocols XX. Security Protocols 2012. Lecture Notes in Computer Science, vol 7622. Springer, Berlin, Heidelberg

Abstract

Security protocols are almost always part of an iterated game, but existing abstractions don’t model this behavior. Models for such systems have been developed in other contexts, and we propose the use of one, John Boyd’s Observe-Orient-Decide-Act (OODA) Loop, as appropriate for the security context.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Sandy Clark
    • 1
  • Matt Blaze
    • 1
  • Jonathan M. Smith
    • 1
  1. 1.University of PennsylvaniaPhiladelphiaUSA

Personalised recommendations