Prevention

<<Taxonomy<< Up to Taxonomy>>Leakage>>

Improper Leakage of Authority or Info

Authenticity

"Principal"
Pseudonymity

Denial of Service

Concurrency Networks Hardware Resources


Each of these are or are not possible or practical depending on the particulars, especially the cooperative patterns the participants are engaged in. The child pages liked to by the table break this into separate cases.

AltStyle によって変換されたページ (->オリジナル) /