Prevention

<<Taxonomy<< Up to Taxonomy>>Leakage>>

Improper Leakage of Authority or Info

Perimeter Security Confinement
Confused Deputy Communicating Conspirators

Authenticity

Object Identity
"Principal"
Pseudonymity

Denial of Service

Concurrency Networks Hardware Resources


Each of these are or are not possible or practical depending on the particulars, especially the cooperative patterns the participants are engaged in. The child pages liked to by the table break this into separate cases.