The Casino and the OODA Loop

Why Our Protocols Always Eventually Fail
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7622)


Security protocols are almost always part of an iterated game, but existing abstractions don’t model this behavior. Models for such systems have been developed in other contexts, and we propose the use of one, John Boyd’s Observe-Orient-Decide-Act (OODA) Loop, as appropriate for the security context.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Boyd, J.: Boyd bibliography,
  2. 2.
    Cellini: The Card Counter’s Guide to Casino Surveillance. Huntington Press Pub. (2003)Google Scholar
  3. 3.
    Boss, A.Z.D.: Casino Security and Gaming Surveillance. Auerback Publications (2010)Google Scholar
  4. 4.
    Forte, S.L.: Casino Game Protection: A Comprehensive Guide. SLF Publishing LLC (2004)Google Scholar
  5. 5.
    Powell, L.F.G., Tyska, L.: Casino Surveillance and Security: 150 Things You Should Know. Asis International (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.University of PennsylvaniaPhiladelphiaUSA

Personalised recommendations