Skip to content

Instantly share code, notes, and snippets.

@ikiril01
Last active December 24, 2025 15:39
Show Gist options
  • Select an option

  • Save ikiril01/99a78341d25ffd2dae4f5e4ebd726f01 to your computer and use it in GitHub Desktop.

Select an option

Save ikiril01/99a78341d25ffd2dae4f5e4ebd726f01 to your computer and use it in GitHub Desktop.
D3FEND 1.3.0 Object Properties
Property Label SubPropertyOf InverseOf Definition
:abuses abuses :uses x abuses y: The entity x applies an artifact y to a wrong thing or person; x applies y badly or incorrectly.
:access-mediated-by access-mediated-by :associated-with :mediates-access-to x access-mediated-by y: The entity or resource x has its access regulated, controlled, or facilitated by entity y, which acts as an intermediary or gatekeeper to enforce access control policies.
:accessed-by accessed-by :associated-with
:may-be-accessed-by
:accesses x accessed-by y: The entity or resource x is accessed by entity y.
:accesses accesses :associated-with
:may-access
x accesses y: An subject x takes the action of reading from, writing into, or executing the stored information in the object y. Reads, writes, and executes are specific cases of accesses.
:addressed-by addressed-by :associated-with :addresses x addressed-by y: Relates a resource x (e.g., network host, peripheral device, disk sector, a memory cell or other logical or physical entity) to a discrete address y in an address space that points to it.
:addresses addresses :associated-with x addresses y: Relates a pointer x to a digital artifact y located in the address space to which x points. The address space is part of some digital store, whether it be in memory, an image, or a persistent storage device.
:adds adds :associated-with
:may-add
x adds y: The subject x adds a data object y, such as a file, to some other digital artifact, such as a directory. Examples include an agent or technique adding a record to a database. or a domain entry to a DNS server.
:analyzes analyzes :associated-with
:detects
x analyzes y: The subject x break down object y into components or essential features, assessing y by quantitative methods, qualitative methods, or both. Usually the analysis is done in terms of some model or framework.
:associated-with associated-with :may-be-associated-with x associated-with y: The subject x and object y are associated in some way. This is the most general definite relationship in d3fend (i.e., most general relationship that is not prefixed by 'may-'.)
:attached-to attached-to :associated-with x attached-to y: A subject x is joined in close association to an object y.
:attack-may-be-countered-by attack-may-be-countered-by :may-be-tactically-associated-with
:authenticates authenticates :associated-with
:hardens
x authenticates y: The subject x establishes the authenticity of some y. This relation indicates an authentication event has occurred.
:authorizes authorizes :associated-with
:hardens
x authorizes y: A subject x grants authorization or clearance for an agent y to use an object. This relation indicates an authorization event has occurred.
:blocks blocks :counters
:filters
x blocks y: The entity x blocks off the use of digital artifact y by reference to a block or allow list (or both.)
:broader broader :semantic-relation x broader y: The entity x represents a more general or inclusive concept than entity y.
:broader-transitive broader-transitive :semantic-relation x broader-transitive y: The entity x represents a more general concept than entity y, including indirect or hierarchical relationships where x encompasses y through intermediate entities.
:carried-by carried-by :associated-with :carries x carried-by y: The information entity x is dependent upon the entity y for its storage, transport, or communication. Entity y serves as the necessary bearer or link from which x can be recovered or interpreted.
:carries carries :associated-with x carries y: The entity x serves as the bearer or link for information y, enabling y to be stored, transported, or communicated such that y can be recovered or interpreted from x
:caused-by caused-by :associated-with :causes x caused-by y: The event or action x occurs as a consequence of event or action y.
:causes causes :associated-with x causes y: The event or action x brings about event or action y as a consequence.
:communicates-with communicates-with :associated-with x communicates-with y: x and y exchange signals or data bidirectionally, enabling mutual awareness, coordination, or interaction.
:configures configures :associated-with
:hardens
x configures y: The entity x sets the operational parameters of entity y, determining how y will operate.
:connected-to connected-to :associated-with x connected-to y: The subject x shares a direct physical or logical link with object y such that communication is possible between them without intermediate routing.
:connects connects :associated-with x connects y: The subject x joins system y by means of communication equipment (to some other system, typically the adversary-targeted host).
:contained-by contained-by :associated-with
:may-be-contained-by
:contains x contained-by y: The entity x exists within or is physically or logically enclosed by entity y.
:contains contains :associated-with
:may-contain
x contains y: A core relation that holds between a whole x and its part y. Equivalent to relational concept 'has part' and thus transitive.
:controlled-by controlled-by :associated-with :controls x controlled-by y: x's operation or behavior is directed or regulated by y.
:controls controls :associated-with x controls y: x directs or regulates y's operational state, behavior, or function.
:copies copies :creates x copies y: An technique or agent x reproduces or makes and exact copy of some digital artifact y.
:copy-of copy-of :associated-with x copy-of y: The subject x is a duplicate of the object y.
:counters counters :may-counter
:created-by created-by :associated-with
:may-be-created-by
:creates x created-by y: The entity x is brought into existence, developed, or generated by entity y.
:creates creates :associated-with
:may-create
x creates y: The subject x bring into existence an object y. Some technique or agent x creates a persistent digital artifact y (as opposed to production of a consumable or transient object.); i.e., bring forth or generate
:d3fend-general-object-property d3fend-general-object-property :d3fend-object-property
:d3fend-kb-object-property d3fend-kb-object-property :d3fend-object-property x d3fend-kb-object-property y: The object y is a d3fend knowledge base object property. These properties allow the linkage of knowledge and information supporting and illustrating the d3fend model.
:d3fend-object-property d3fend-object-property
:d3fend-process-object-property d3fend-process-object-property :d3fend-object-property
:d3fend-tactical-verb-property d3fend-tactical-verb-property :d3fend-object-property
:d3fend-use-case-object-property d3fend-use-case-object-property :d3fend-object-property
:deceives deceives :counters
:deceives-with deceives-with :d3fend-tactical-verb-property x deceives-with y: The entity x misleads or manipulates another entity using y as a tool, method, or mechanism to create false perceptions or understanding.
:decodes decodes :associated-with x decodes y: Entity x transforms data y to a different form, usually through decompression.
:deletes deletes :evicts
:modifies
x deletes y: A technique or agent x wipes out the digitally or magnetically recorded information of digital object y.
:dependent dependent :associated-with x dependent y: A dependent y is an entity that requires the fulfillment of the requirements specified in dependency x.
:depends-on depends-on :associated-with :has-dependent x depends-on y: The entity x is contingent on y being available; x relies on y.
:detects detects :counters
:d3fend-tactical-verb-property
x detects y: The entity x discovers the presence, occurrence, or state of entity y through observation or measurement.
:disables disables :evicts
:may-disable
:modifies
x disables y: The technique or agent x makes an entity y unable to perform its actions or capabilities.
:drives drives :associated-with x drives y: The device driver x causes a system component y to function by controlling it.
:employed-by employed-by :associated-with :employs x employed-by y: An entity x is put into service by a technique or agent y. Inverse of y employs x.
:employs employs :associated-with x employs y: The entity x makes purposeful use of entity y to perform a function.
:enabled-by enabled-by :associated-with :enables x enabled-by y: A top level technique y enables a tactic x, that is, the property indicates that a technique y is used to put a particular tactic x into action. In other words, y renders x capable or able for some task. Inverse of enables.
:enables enables :associated-with x enables y: A top level technique x enables a tactic y, that is, the property indicates that a technique x is used to put a particular tactic y into action. In other words, x renders y capable or able for some task.
:encodes encodes :associated-with x encodes y: Entity x transforms data y to a different form, usually through compression.
:encrypts encrypts :associated-with
:hardens
x encrypts y: The entity x converts the ordinary representation of a digital artifact y into a secret code.
:end end :d3fend-process-object-property
:enforces enforces :associated-with x enforces y: Technique x forces entity y to be compliant with a law, rule, or obligation.
:enumerates enumerates :reads x enumerates y: The subject x takes the action of reading from a digital source y to acquire data and create a list of its contents.
:erases erases :associated-with x erases y: A technique x removes recorded data from storage device y creating space for new data.
:evaluated-by evaluated-by :associated-with :evaluates x evaluated-by y: The entity x is assessed and analyzed by entity y.
:evaluates evaluates :associated-with
:may-evaluate
x evaluates y: The entity x systematically assesses entity y to judge its state, quality, or risk.
:evicts evicts :counters
:d3fend-tactical-verb-property
:may-evict
x evicts y: The entity x forcibly removes entity y from the environment or resource where y was residing.
:exactly exactly :semantic-relation x exactly y: The entity x is identical to or fully corresponds to entity y.
:excises excises :associated-with x excises y: Technique x removes a section of entity y.
:executed-by executed-by :associated-with :executes x executed-by y: The entity or function x is carried out, performed, or run by entity y.
:executes executes :accesses
:may-execute
:runs
x executes y: The subject x takes the action of carrying out (executing) y, which is a single software module, function, or instruction.
:extends extends :modifies x extends y: The entity x extend the scope or range or area of entity y, especially in the sense of widen the range of applications.
:filters filters :associated-with
:isolates
x filters y: An technique or agent x removes some specified set of of entities from the content of a digital artifact y, by passing an artifact's content through a filter. A filter is a device that removes something from whatever passes through it.
:forges forges :creates x forges y: An technique or agent x counterfeits a digital artifact y, such as a fake credential, with the intent to deceive.
:fork fork :d3fend-process-object-property
:hardens hardens :counters
:d3fend-tactical-verb-property
x hardens y: The entity x fortifies entity y to reduce its weaknesses so y can better withstand attack or failure.
:has-account has-account :owns x has-account y: The subject x has ownership or possession of some account y.
:has-agent has-agent :has-participant x has-agent y: The event x occurs because agent y actively carries it out.
:has-audience has-audience :d3fend-use-case-object-property
:has-contribution has-contribution :d3fend-kb-object-property
:has-contributor has-contributor :d3fend-kb-object-property
:has-dependent has-dependent :associated-with x has-dependent y: The entity x is relied upon or required by entity y.
:has-goal has-goal :d3fend-use-case-object-property
:has-input has-input :has-participant :input-of x has-input y: An event x has input y iff y is an artifact that is present at the start of x, provides material or information required for x to begin, and during x either y's state is altered or the information content it bears is realized.
:has-location has-location :associated-with x has-location y: The entity x is situated in a particular spot or position y.
:has-mediator has-mediator :has-participant x has-mediator y: The entity x relies on or is facilitated by entity y.
:has-member has-member :d3fend-kb-object-property :member-of
:has-operating-mode has-operating-mode :associated-with x has-operating-mode y: The entity x is currently operating in or has the potential to be in operating mode y.
:has-output has-output :has-participant :output-of x has-output y: An event x has output y iff y is an artifact that is present at the end of x, was not present in the same state at the start of x, and whose presence at the end is required for x to be considered complete; the change in state may arise either from a transformation of y itself or from the realization of the information content y bears.
:has-participant has-participant :associated-with :participates-in x has-participant y: The event x involves an object y as a participant, indicating that y plays some role in the event, whether actively, passively, or otherwise.
:has-prerequisite has-prerequisite :d3fend-use-case-object-property
:has-procedure has-procedure :d3fend-general-object-property
:has-recipient has-recipient :associated-with x has_recipient y: An agent y is the intended recipient and decoder of the information contained in communication x.
:has-sender has-sender :associated-with x has_sender y: An agent y is the sender and encoder of the information contained in communication x.
:has-weakness has-weakness :may-have-weakness :weakness-of x has-weakness y: The entity x exhibits a condition y that could, in some circumstances, lead to a vulnerability.
:hides hides :associated-with x hides y: A technique or operation x conceals the digital artifact y.
:identified-by identified-by :associated-with :identifies x identified-by y: The entity x is recognized or described by entity y.
:identifies identifies :associated-with x identifies y: The entity x recognizes or brings attention to entity y, making it distinct or clear through naming, description, or discovery.
:impairs impairs :associated-with x impairs y: The entity or action x hinders entity y by reducing its normal function, capacity, or availability.
:implemented-by implemented-by :associated-with :implements x implemented-by y: The entity x is realized or brought into operation by entity y.
:implements implements :associated-with x implements y: The entity x realize entity y by putting its design or specification into effect.
:initiates initiates :associated-with x initiates y: The entity or action x starts or triggers entity or function y, bringing it into action.
:injects injects :executes x injects y: The subject x takes the action of exploiting a security flaw by introducing (injecting) y, which is code or data that will change the course of execution or state of a computing process to an alternate course or state.
:input-of input-of :participates-in x input-of y: An artifact x is input of an event y iff x participates at the start of y, provides the material or information required for y to begin, and during y either x's state is altered or the information content it bears is realized.
:installs installs :associated-with x installs y: An entity x sets up a digital artifact y for subsequent use. For example, an installation program can install application software.
:instructed-by instructed-by :associated-with x instructed-by y: A subject x takes machine instructions from object y.
:instructs instructs :associated-with x instructs y: A subject x delivers machine instructions to object y.
:interprets interprets :executes
:may-interpret
x interprets y: The subject x interprets the executable script y. The sense of interprets is here 'Parse the source code and perform its behavior directly.'
:inventoried-by inventoried-by :associated-with :inventories x inventoried-by y: The entity x is cataloged, recorded, or tracked by entity y.
:inventories inventories :associated-with x inventories y: The entity x systematically discovers entity y and records its presence and key details for tracking.
:invoked-by invoked-by :associated-with
:may-be-invoked-by
:invokes x invoked-by y: The entity x is called, triggered, or activated by entity y.
:invokes invokes :executes
:may-invoke
x invokes y: The subject x invokes a system service y by use of an instruction object y that interrupts the program being executed and passes control to the operating system to perform that operation.
:isolates isolates :associated-with
:d3fend-tactical-verb-property
x isolates y: The technique or agent x sets digital artifact y apart from other digital artifacts, sequestering y.
:kb-reference kb-reference :d3fend-kb-object-property :kb-reference-of
:kb-reference-of kb-reference-of :d3fend-kb-object-property x kb-is-example-of y: The reference x is an example of technique y.
:limits limits :restricts x limits y: An entity x specifies a designated limit beyond which some entity y cannot function or must be terminated.
:loaded-by loaded-by :associated-with :loads x loaded-by y: The entity x is brought into memory by entity y.
:loads loads :associated-with x loads y: The technique or process x transfers a software from a storage y to a computer's memory for subsequent execution.
:manages manages :associated-with x manages y: The technique or agent x watches and directs the use of a digital artifact y.
:mapped-by mapped-by :associated-with :maps x mapped-by y: The entity x is linked to another entity by entity y.
:maps maps :may-map x maps y: The entity x discovers and records how entity y is arranged and interconnected.
:may-access may-access :may-be-associated-with :may-be-accessed-by x may-access y: They entity x may access the thing y; that is, 'x accesses y' may be true.
:may-add may-add :may-be-associated-with x may-add y: They entity x may add the thing y; that is, 'x adds y' may be true.
:may-be-accessed-by may-be-accessed-by :may-be-associated-with
:may-be-associated-with may-be-associated-with :d3fend-object-property x may-be-associated-with y: The subject x and object y may be associated in some way.
:may-be-contained-by may-be-contained-by :may-be-associated-with :may-contain
:may-be-created-by may-be-created-by :may-be-associated-with :may-create
:may-be-deceived-by may-be-deceived-by :attack-may-be-countered-by :may-deceive
:may-be-detected-by may-be-detected-by :attack-may-be-countered-by :may-detect
:may-be-evicted-by may-be-evicted-by :attack-may-be-countered-by :may-evict
:may-be-hardened-against-by may-be-hardened-against-by :attack-may-be-countered-by :may-harden
:may-be-invoked-by may-be-invoked-by :may-be-associated-with :may-invoke
:may-be-isolated-by may-be-isolated-by :attack-may-be-countered-by :may-isolate
:may-be-modified-by may-be-modified-by :may-be-associated-with :may-modify
:may-be-tactically-associated-with may-be-tactically-associated-with :may-be-associated-with x may-be-tactically-associated-with y: the defensive action x may be a tactic that counters offensive action y.
:may-be-weakness-of may-be-weakness-of :may-be-associated-with :may-have-weakness
:may-contain may-contain :may-be-associated-with to potentially have as contents or constituent parts; comprise; include.
:may-counter may-counter :may-be-associated-with
:may-counter-attack may-counter-attack :may-be-tactically-associated-with
:may-create may-create :may-be-associated-with x may-create y: They entity x may create the entity y; that is, 'x creates y' may be true.
:may-deceive may-deceive :may-counter-attack
:may-detect may-detect :may-counter-attack
:may-disable may-disable :may-evict
:may-evaluate may-evaluate :may-be-associated-with
:may-evict may-evict :may-counter
:may-counter-attack
:may-execute may-execute :may-be-associated-with x may execute y: The subject x might take the action of carrying out (executing) y, which is a single software module, function, or instruction.
:may-harden may-harden :may-counter-attack
:may-have-weakness may-have-weakness :may-be-associated-with
:may-interpret may-interpret :may-be-associated-with x may-interpret y: They entity x may interpret the thing y; that is, 'x interprets y' may be true.
:may-invoke may-invoke :may-be-associated-with x may-invoke y: They entity x may invoke the thing y; that is, 'x invokes y' may be true.
:may-isolate may-isolate :may-counter-attack
:may-map may-map :may-be-associated-with
:may-modify may-modify :may-be-associated-with x may-modify y: They entity x may modify the thing y; that is, 'x modifies y' may be true.
:may-produce may-produce :may-be-associated-with x may-produce y: They entity x may produce the thing y; that is, 'x produces y' may be true.
:may-query may-query :may-be-associated-with
:may-run may-run :may-be-associated-with x may-run y: They entity x may run the thing y; that is, 'x runs y' may be true.
:may-transfer may-transfer :may-be-associated-with x may-transfer y: They entity x might send the thing y; that is, 'x transfers y' may be true.
:mediates-access-to mediates-access-to :associated-with x mediates-access-to y: The entity x controls and brokers requests to reach entity y, enforcing the access rules that allow or deny it.
:member-of member-of :d3fend-kb-object-property
:modified-by modified-by :associated-with
:may-be-modified-by
:modifies x modified-by y: The entity x is changed by entity y.
:modifies modifies :accesses
:associated-with
:may-modify
x modifies y: A technique or agent x causes a digital object y to change; become different; or undertake a transformation. Afterwards, the data or state held by a digital object is changed.
:modifies-part modifies-part :may-modify x modifies-part y: The entity x modifies a part of y.
:monitors monitors :associated-with
:detects
x monitors y: The technique or agent x keep tabs on; keeps an eye on; or keep the digital artifact y under surveillance.
:narrower narrower :semantic-relation x narrower y: The entity x represents a more specific or focused concept than entity y.
:narrower-transitive narrower-transitive :semantic-relation x narrower-transitive y: The entity x represents a more specific concept than entity y, including indirect or hierarchical relationships where x is a subset of y through intermediate entities.
:neutralizes neutralizes :associated-with
:hardens
x neutralizes y: The technique x makes the execution of actions of y ineffective by preventing or counterbalancing the effect of y.
:next next :d3fend-process-object-property
:obfuscates obfuscates :evicts
:modifies
x obfuscates y: The technique x makes the digital artifact y unclear or obscure. Typically obfuscation is a way to hide a digital artifact from discovery, use, or both.
:operates operates :associated-with x operates y: The entity x enables, activates, or controls the functioning or behavior of object y (operated entity), typically in accordance with the design or intended use of the operated entity.
:originates-from originates-from :associated-with x originates-from y: The digital event or artifact x began its network transit from a physical location y.
:output-of output-of :participates-in x output-of y: An artifact x is output of an event y iff x must be present when y concludes, was absent in the same state when x began, and y counts as complete only when x is available at its end.
:owns owns :associated-with x owns y: The subject x has ownership or possession of some object y.
:participates-in participates-in :associated-with x participates-in y: The object x takes part in the event y, signifying that x contributes to or is affected by the event’s occurrence in some way.
:powered-by powered-by :depends-on :powers x powered-by y: x obtains its essential energy or force from y to perform its function or remain active.
:powers powers :has-dependent x powers y: x furnishes y with the energy or force required for y's functionality or operation.
:preceded-by preceded-by :associated-with :precedes x preceded-by y: The event or action x occurs after event or action y in time.
:precedes precedes :associated-with x precedes y: The event or action x occurs before event or action y in time.
:process-ancestor process-ancestor :process-property x process-ancestor y: The process y is a process ancestor of process x, indicating one or more process creation events were conducted were started at process y and subsequently created process x.
:process-image-path process-image-path :process-property x process-image-path y: The filepath y is the process image path for the process x, indicating the path to the resource from which the process's image was loaded.
:process-parent process-parent :process-ancestor x process-parent y: The process y created the process x (directly) with a create process event.
:process-property process-property :associated-with x process-property y: Process x has the a process-property y. This is generalization for specific process object properties.
:process-user process-user :process-property x process-user y: The process x has been executed by the user y.
:produced-by produced-by :associated-with :produces x produced-by y: The entity x is created by entity y.
:produces produces :associated-with
:may-produce
x produces y: The subject entity x or process produces a data object y, which may be discrete digital object or a stream (e.g., a stream such as network traffic.)
:provider provider :associated-with x provider y: A provider y is an entity that supplies a service, system, or data resources to a dependent entity x.
:quarantines quarantines :associated-with x quarantines y: Technique x moves entity y to a place of isolation.
:queries queries :associated-with
:may-query
x queries y: The entity x requests information or data from entity y.
:reads reads :accesses x reads y: The subject x takes the action of reading from a digital source y to acquire data and placing it into volatile memory for processing.
:receives receives :associated-with x receives y: The subject x acquires object y from a communication medium and transfers y into its local context for storage or processing.
:recorded-in recorded-in :associated-with :records x recorded-in y: The event x is documented, logged, or otherwise preserved within the digital artifact y, which stores or encodes relevant data about the event.
:records records :associated-with x records y: The digital artifact x makes a record of events y; set down in permanent form.
:regenerates regenerates :associated-with
:hardens
x regenerates y: The entity x discards the current digital artifact y and creates a new version that serves the same function.
:related related :semantic-relation x related y: x has a symmetric associative relation to y.
:restores restores :associated-with x restores y: The entity x returns entity y to its known-good or previous state.
:restricted-by restricted-by :associated-with :restricts x restricted-by y: The entity x is limited, constrained, or regulated by entity y.
:restricts restricts :associated-with
:isolates
x restricts y: An entity x bounds the use of entity y.
:resume resume :d3fend-process-object-property The agent or technique x continues a previous action on entity y. Usually occurs after suspension on y.
:resumes resumes :associated-with The agent or technique x continues a previous action on entity y. Usually occurs after suspension on y.
:runs runs :associated-with
:may-run
x runs y: To carry out a process or program y, as on a computer or a machine x; where y may be a large software assembly or a specific module or instruction.
:semantic-relation semantic-relation :associated-with x semantic-relation y: The entity x is conceptually or meaningfully connected to entity y.
:signed-by signed-by :validated-by :signs x signed-by y: The digital artifact x includes a signature generated by the entity y, certifying the authenticity and integrity of x. This relationship indicates that x has undergone a validation process by y, using cryptographic measures to ensure that x is trustworthy and unaltered since the signing by y.
:signs signs :validates x signs y: The entity x applies a digital signature to the digital artifact y, thereby asserting its validity, integrity, and authenticity.
:spoofs spoofs :associated-with
:deceives-with
x spoofs y: The technique x creates a fake instance of a digital artifact y; that is, y is a decoy, fake, or counterfeit.
:start start :d3fend-process-object-property
:strengthens strengthens :associated-with
:hardens
x strengthens y: The technique x make digital artifact y resistant (to harm or misuse.)
:summarizes summarizes :associated-with x summarizes y: The sensor x summarizes a set y of events concerning digital artifacts over time.
:suspends suspends :evicts x suspends y: The agent or technique x pauses entity y.
:terminates terminates :associated-with
:evicts
x terminates y: The technique x brings to an end or halt to some activity y.
:transmits transmits :associated-with x transmits y: The subject x actively emits object y onto a communication medium, rendering y observable and available for reception on that medium.
:unloads unloads :evicts x unloads y: The technique or artifact performs the action of unloading some artifact (applications, kernel modules, or hardware drivers, etc.) from a computer's memory.
:unmounts unmounts :associated-with x unmounts y: An operation x removes the access via computer system's file system the availability of files and directories on a storage artifact y. Unmounts reverse or undo prior mount operations.
:updates updates :hardens
:modifies
x updates y: The technique x updates the software for component y.
:use-limits use-limits :limits x use-limits y: An entity x specifies a designated number of uses beyond which some entity y cannot function or must be terminated.
:used-by used-by :associated-with :uses x used-by y: is inverse of y uses x.
:uses uses :associated-with x uses y: An entity x puts into service a resource or implement y; makes y work or employ for a particular purpose or for its inherent or natural purpose.
:validated-by validated-by :associated-with
:hardens
x validated-by y: The digital artifact x has its authenticity and correctness confirmed or verified by the technique, operation, or agent y.
:validates validates :associated-with
:hardens
x validates y: The technique x proves the digital artifact y is valid; that is, x shows or confirms the validity of y.
:verifies verifies :analyzes
:associated-with
x verifies y: A technique x confirms the truth of a digital artifact y.
:weakness-of weakness-of :may-be-weakness-of
:writes writes :accesses x writes y: The subject x takes the action of writing to a digital artifact y to store data and placing it into persistent memory for later reference.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment