From f0d58874f73729bdc967a9f1ce2954899cb68330 Mon Sep 17 00:00:00 2001
From: Pamela Dyer <pamela.dyer@uconn.edu>
Date: Thu, 17 Jun 2021 23:17:45 +0000
Subject: [PATCH] Update Application_examples/Web_Browser_Formal_Security.mp

---
 Application_examples/Web_Browser_Formal_Security.mp | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/Application_examples/Web_Browser_Formal_Security.mp b/Application_examples/Web_Browser_Formal_Security.mp
index d1c969e..86f8c3e 100644
--- a/Application_examples/Web_Browser_Formal_Security.mp
+++ b/Application_examples/Web_Browser_Formal_Security.mp
@@ -38,7 +38,8 @@ in order to model the vulnerabilities explained in the papers above.
     how MP can check whether Client's web query may 
 	be indirectly affected by Bad Server's Redirect intervention.
     
-==============================================================================*/
+==========================================================*/
+
 SCHEMA Web_browser
 
 /* Response may embed some Request events,
-- 
GitLab