Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model.
Weijin WangYu QinDengguo FengPublished in: ISPEC (2014)
Keyphrases
- computational model
- computational models
- access control
- computational framework
- fine grained
- automated theorem provers
- cognitive architecture
- language acquisition
- computational modeling
- working memory
- theorem prover
- cognitive modeling
- visual processing
- conflict resolution
- object recognition
- security requirements
- trust management
- computer science