Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version).
Weijin WangYu QinDengguo FengPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- computational model
- computational models
- computational framework
- automated theorem provers
- access control
- cognitive modeling
- computational modeling
- fine grained
- language acquisition
- visual processing
- theorem prover
- cognitive architecture
- working memory
- knowledge representation
- industrial applications
- security policies
- conflict resolution
- role based access control