LEADER 03088oam 2200613I 450 001 9910797026503321 005 20230725060952.0 010 $a1-4398-9155-9 010 $a0-429-18443-3 010 $a1-4398-9463-9 024 7 $a10.1201/9781439894637 035 $a(CKB)3710000000391605 035 $a(EBL)1648320 035 $a(SSID)ssj0001457944 035 $a(PQKBManifestationID)12523623 035 $a(PQKBTitleCode)TC0001457944 035 $a(PQKBWorkID)11444207 035 $a(PQKB)10483290 035 $a(MiAaPQ)EBC1648320 035 $a(Au-PeEL)EBL1648320 035 $a(CaPaEBR)ebr11167520 035 $a(OCoLC)908079522 035 $a(EXLCZ)993710000000391605 100 $a20180706d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAccess control, security, and trust $ea logical approach /$fby Shiu-Kai Chin and Susan Beth Older 205 $aFirst edition. 210 1$aBoca Raton, FL :$cChapman and Hall/CRC, an imprint of Taylor and Francis,$d2010. 215 $a1 online resource (348 p.) 225 1 $aChapman & Hall/CRC Cryptography and Network Security 300 $a"A Chapman & Hall Book." 311 $a1-58488-862-8 320 $aIncludes bibliographical references and index. 327 $aFront cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection 327 $aChapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover 330 3 $aDeveloped from the authors? courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. 410 0$aChapman & Hall/CRC cryptography and network security. 606 $aComputers$xAccess control 606 $aSystem design 615 0$aComputers$xAccess control. 615 0$aSystem design. 676 $a005.8 700 $aChin$b Shiu-Kai$01563491 702 $aOlder$b Susan Beth 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910797026503321 996 $aAccess control, security, and trust$93831947 997 $aUNINA