03088oam 2200613I 450 991079702650332120230725060952.01-4398-9155-90-429-18443-31-4398-9463-910.1201/9781439894637 (CKB)3710000000391605(EBL)1648320(SSID)ssj0001457944(PQKBManifestationID)12523623(PQKBTitleCode)TC0001457944(PQKBWorkID)11444207(PQKB)10483290(MiAaPQ)EBC1648320(Au-PeEL)EBL1648320(CaPaEBR)ebr11167520(OCoLC)908079522(EXLCZ)99371000000039160520180706d2010 uy 0engur|n|---|||||txtccrAccess control, security, and trust a logical approach /by Shiu-Kai Chin and Susan Beth OlderFirst edition.Boca Raton, FL :Chapman and Hall/CRC, an imprint of Taylor and Francis,2010.1 online resource (348 p.)Chapman & Hall/CRC Cryptography and Network Security"A Chapman & Hall Book."1-58488-862-8 Includes bibliographical references and index.Front cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory ProtectionChapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back coverDeveloped from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.Chapman & Hall/CRC cryptography and network security.ComputersAccess controlSystem designComputersAccess control.System design.005.8Chin Shiu-Kai1563491Older Susan BethFlBoTFGFlBoTFGBOOK9910797026503321Access control, security, and trust3831947UNINA