|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910460736103321 |
|
|
Autore |
Chin Shiu-Kai |
|
|
Titolo |
Access control, security, and trust : a logical approach / / by Shiu-Kai Chin and Susan Beth Older |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2010 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-429-18443-3 |
1-4398-9463-9 |
|
|
|
|
|
|
|
|
Edizione |
[First edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (348 p.) |
|
|
|
|
|
|
Collana |
|
Chapman & Hall/CRC Cryptography and Network Security |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computers - Access control |
System design |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection |
Chapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. |
|
|
|
|
|
|
|