Abstract
Security protocols are almost always part of an iterated game, but existing abstractions don’t model this behavior. Models for such systems have been developed in other contexts, and we propose the use of one, John Boyd’s Observe-Orient-Decide-Act (OODA) Loop, as appropriate for the security context.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boyd, J.: Boyd bibliography, http://danford.net/boyd/
Cellini: The Card Counter’s Guide to Casino Surveillance. Huntington Press Pub. (2003)
Boss, A.Z.D.: Casino Security and Gaming Surveillance. Auerback Publications (2010)
Forte, S.L.: Casino Game Protection: A Comprehensive Guide. SLF Publishing LLC (2004)
Powell, L.F.G., Tyska, L.: Casino Surveillance and Security: 150 Things You Should Know. Asis International (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Clark, S., Blaze, M., Smith, J.M. (2012). The Casino and the OODA Loop. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XX. Security Protocols 2012. Lecture Notes in Computer Science, vol 7622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35694-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-35694-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35693-3
Online ISBN: 978-3-642-35694-0
eBook Packages: Computer ScienceComputer Science (R0)