LEADER 03088oam 2200613I 450 001 9910797026503321 005 20230725060952.0 010 $a1-4398-9155-9 010 $a0-429-18443-3 010 $a1-4398-9463-9 024 7 $a10.1201/9781439894637 035 $a(CKB)3710000000391605 035 $a(EBL)1648320 035 $a(SSID)ssj0001457944 035 $a(PQKBManifestationID)12523623 035 $a(PQKBTitleCode)TC0001457944 035 $a(PQKBWorkID)11444207 035 $a(PQKB)10483290 035 $a(MiAaPQ)EBC1648320 035 $a(Au-PeEL)EBL1648320 035 $a(CaPaEBR)ebr11167520 035 $a(OCoLC)908079522 035 $a(EXLCZ)993710000000391605 100 $a20180706d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAccess control, security, and trust $ea logical approach /$fby Shiu-Kai Chin and Susan Beth Older 205 $aFirst edition. 210 1$aBoca Raton, FL :$cChapman and Hall/CRC, an imprint of Taylor and Francis,$d2010. 215 $a1 online resource (348 p.) 225 1 $aChapman & Hall/CRC Cryptography and Network Security 300 $a"A Chapman & Hall Book." 311 $a1-58488-862-8 320 $aIncludes bibliographical references and index. 327 $aFront cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection 327 $aChapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover 330 3 $aDeveloped from the authors? courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. 410 0$aChapman & Hall/CRC cryptography and network security. 606 $aComputers$xAccess control 606 $aSystem design 615 0$aComputers$xAccess control. 615 0$aSystem design. 676 $a005.8 700 $aChin$b Shiu-Kai$01563491 702 $aOlder$b Susan Beth 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910797026503321 996 $aAccess control, security, and trust$93831947 997 $aUNINA LEADER 01751nam0 22003973i 450 001 MIL0839447 005 20251003044238.0 010 $a8838668191 010 $a9788838668197 100 $a20241218d2013 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 183 1$6z01$anc$2RDAcarrier 200 1 $aReti di calcolatori$eun approccio top-down$fBehrouz A. Forouzan, Firouz Mosharraf$gedizione italiana a cura di Gabriele D'Angelo e Gaia Maselli 210 $aMilano [et al.]$cMcGraw - Hill$d2013 215 $aXII, 486, 44 p.$d26 cm 225 | $aCollana di istruzione scientifica$i. Serie di telecomunicazioni 300 $aIn copertina : Con eserciziario 410 0$1001UBO1483772$12001 $aCollana di istruzione scientifica$i. Serie di telecomunicazioni 500 10$aComputer networks : a top-down approach$3MIL0839448$9RMSV037856$948378 676 $a004.6$9INFORMATICA. INTERFACCIAMENTO E COMUNICAZIONI.$v22 676 $a004.6$9$v23 700 1$aForouzan$b, Behrouz A.$3RMSV037856$0474623 701 1$aMosharraf$b, Firouz$3MILV345448$0521157 702 1$aD'Angelo$b, Gabriele$f <1975- >$3CFIV370638$4340 702 1$aMaselli$b, Gaia$3MILV345449$4340 801 3$aIT$bIT-000000$c20241218 850 $aIT-BN0095 901 $bNAP 01$cBCA $nComprende monografie e periodici di diritto, testi di ingegneria, di scienze e tecnologia di nuova acquisizione. 912 $aMIL0839447 950 0$aBiblioteca Centralizzata di Ateneo$c1 v.$d 01BCA SC. TECNOL 29$e 01 0000133075 VMA 1 v.$fA $h20231219$i20240521 977 $a 01 996 $aComputer Networks: A Top-Down Approach$948378 997 $aUNISANNIO