LEADER 01158nam0 22002891i 450 001 UON00083130 005 20231205102435.917 100 $a20020107d1904 |0itac50 ba 101 $aeng 102 $aGB 105 $a|||| ||||| 200 1 $aNew Africa$ean essay on government civilization in new countries and on the foundation, organization and administration of the Congo free state$fE. Descamps 205 $a2 ed 210 $aLondon$cSampson Low, Marston and company$d1904 215 $axv, 476 p.$d22 cm 316 $a*Data inesatta$5IT-UONSI AORST/003 606 $aCONGO$xStoria$3UONC025259$2FI 620 $aGB$dLondon$3UONL003044 676 $a967.24$cSTORIA DEL CONGO$v21 700 1$aDESCAMPS$bE.$3UONV054782$0408743 712 $aSampson Low, Marston & Co.$3UONV258330$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00083130 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI AOR ST 003 $eSI AA 2013 5 003 *Data inesatta 996 $aNew Africa$91295817 997 $aUNIOR LEADER 05732nam 2200553 450 001 9910809941403321 005 20230125185056.0 010 $a1-63081-496-2 035 $a(CKB)4100000004835344 035 $a(MiAaPQ)EBC5430722 035 $a(CaBNVSL)mat09100400 035 $a(IEEE)9100400 035 $a(EXLCZ)994100000004835344 100 $a20200730d2017 uy 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAttribute-Based Access Control 210 1$aBoston, Massachusetts :$cArtech House,$d2018. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2017] 215 $a1 online resource (285 pages) 225 1 $aArtech House information security and privacy series 311 $a1-63081-134-3 320 $aIncludes bibliographical references and index. 327 $aAttribute-Based Access Control; Contents; Preface; Acknowledgements; Intended Audience; 1 Introduction; 1.1 Overview; 1.2 Evolution and Brief History of Access Control; 1.2.1 Academic Contributions; 1.2.2 Military Concerns; 1.2.3 Bell and LaPadula Security Model; 1.2.5 Discontent; 1.2.6 Role-based Access Control; 1.2.7 Emergence of ABAC; References; 2 Access Control Models and Approaches; 2.1 Introduction; 2.2 Terminology; 2.3 Access Control Models and Policies; 2.4 Policy Enforcement; 2.5 Discretionary Access Control; 2.6 Mandatory Access Control Models; 2.6.1 Multilevel Security 327 $a2.6.2 Chinese Wall Policy and Model2.6.3 Role-Based Access Control; References; 3 Attribute Based Access Control; 3.1 Introduction; 3.2 ABAC Architectures and Functional Components; 3.3 Logical-Formula and Enumerated ABAC Policy Models; 3.4 ABAC Model-Applications Primatives; 3.5 Hierarchical Group and Attribute-Based Access Control; 3.6 Label-Based ABAC Model with Enumerated Authorization Policy; 3.7 Hybrid Designs Combining Attributes with Roles; 3.8 ABAC and RBAC Hybrid Models; 3.9 Complexities of RBAC Role Structures; 3.10 Complexities of ABAC Rule Sets; 3.11 Dynamic Roles 327 $a3.12 Role Centric Structure3.13 Attribute Centric Structure; 3.14 Conclusion; References; 4 ABAC Deployment Using XACML; 4.1 Introduction; 4.2 Business and Technical Drivers for XACML; 4.3 XACML Standard-Components and Their Interactions; 4.3.1 XACML Policy Language Model; 4.3.2 XACML Context (Request and Response); 4.3.3 XACML Framework (Data Flow Model); 4.4 ABAC Deployment Using XACML; 4.4.1 Access Policy Formulation and Encoding; 4.4.2 Request/Response Formulation; 4.4.3 Policy Evaluation and Access Decision; 4.5 Implementation of XACML Framework; 4.5.1 Attribute Support and Management 327 $a4.5.2 Delegation4.6 Review and Analysis; References; Appendix A; 5 Next Generation Access Control; 5.1 Introduction; 5.2 Policy and Attribute Elements; 5.3 Relations; 5.3.1 Assignments and Associations; 5.3.2 Prohibitions Denials; 5.3.3 Obligations; 5.4 NGAC Decision Function; 5.5 Delegation of Access Rights; 5.6 NGAC Administrative Commands and Routines; 5.7 Arbitrary Data Service Operations; 5.8 NGAC Functional Architecture; 5.8.1 Resource Access; 5.8.2 Administrative Access; 5.9 Conclusion; References; 6 ABAC Policy Verifications and Testing; 6.1 Introduction; 6.2 ABAC Policy Classes 327 $a6.2.1 Static Policy Class6.2.2 Dynamic Policy Class; 6.2.3 Historical Policy Class; 6.3 Access Control Safety and Faults; 6.4 Verification Approaches; 6.4.1 Model Verification; 6.4.2 Coverage and Confinements Semantic Faults; 6.4.3 Property Confinement Checking; 6.4.4 Implementation Test; 6.5 Implementation Considerations*; 6.6 Verification Tools; 6.6.1 Multiterminal Binary Decision Diagrams; 6.6.2 ACPT; 6.6.3 Formal Methods; 6.7 Conclusion; References; 7 Attribute Consideration; 7.1 Introduction; 7.2 ABAC Attributes; 7.3 Consideration Elements; 7.4 Preparation Consideration 330 3 $aThis comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well as deployment challenges.n nReaders find authoritative insight into specialized topics including formal ABAC history, ABAC's relationship with other access control models, ABAC model validation and analysis, verification and testing, and deployment frameworks such as XACML. Next Generation Access Model (NGAC) is explained, along with attribute considerations in implementation. The book explores ABAC applications in SOA/workflow domains, ABAC architectures, and includes details on feature sets in commercial and open source products. This insightful resource presents a combination of technical and administrative information for models, standards, and products that will benefit researchers as well as implementers of ABAC systems in the field.$cPublisher abstract. 410 0$aArtech House information security and privacy series. 606 $aComputer security 606 $aComputers$xAccess control 606 $aComputer networks$xAccess control 615 0$aComputer security. 615 0$aComputers$xAccess control. 615 0$aComputer networks$xAccess control. 676 $a005.8 700 $aHu$b Vincent$01135046 702 $aHu$b Vincent C. 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910809941403321 996 $aAttribute-Based Access Control$94108255 997 $aUNINA