top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Attribute-Based Access Control
Attribute-Based Access Control
Autore Hu Vincent
Pubbl/distr/stampa Boston, Massachusetts : , : Artech House, , 2018
Descrizione fisica 1 online resource (285 pages)
Disciplina 005.8
Collana Artech House information security and privacy series
Soggetto topico Computer security
Computers - Access control
Computer networks - Access control
Soggetto genere / forma Electronic books.
ISBN 1-63081-496-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attribute-Based Access Control; Contents; Preface; Acknowledgements; Intended Audience; 1 Introduction; 1.1 Overview; 1.2 Evolution and Brief History of Access Control; 1.2.1 Academic Contributions; 1.2.2 Military Concerns; 1.2.3 Bell and LaPadula Security Model; 1.2.5 Discontent; 1.2.6 Role-based Access Control; 1.2.7 Emergence of ABAC; References; 2 Access Control Models and Approaches; 2.1 Introduction; 2.2 Terminology; 2.3 Access Control Models and Policies; 2.4 Policy Enforcement; 2.5 Discretionary Access Control; 2.6 Mandatory Access Control Models; 2.6.1 Multilevel Security
2.6.2 Chinese Wall Policy and Model2.6.3 Role-Based Access Control; References; 3 Attribute Based Access Control; 3.1 Introduction; 3.2 ABAC Architectures and Functional Components; 3.3 Logical-Formula and Enumerated ABAC Policy Models; 3.4 ABAC Model-Applications Primatives; 3.5 Hierarchical Group and Attribute-Based Access Control; 3.6 Label-Based ABAC Model with Enumerated Authorization Policy; 3.7 Hybrid Designs Combining Attributes with Roles; 3.8 ABAC and RBAC Hybrid Models; 3.9 Complexities of RBAC Role Structures; 3.10 Complexities of ABAC Rule Sets; 3.11 Dynamic Roles
3.12 Role Centric Structure3.13 Attribute Centric Structure; 3.14 Conclusion; References; 4 ABAC Deployment Using XACML; 4.1 Introduction; 4.2 Business and Technical Drivers for XACML; 4.3 XACML Standard-Components and Their Interactions; 4.3.1 XACML Policy Language Model; 4.3.2 XACML Context (Request and Response); 4.3.3 XACML Framework (Data Flow Model); 4.4 ABAC Deployment Using XACML; 4.4.1 Access Policy Formulation and Encoding; 4.4.2 Request/Response Formulation; 4.4.3 Policy Evaluation and Access Decision; 4.5 Implementation of XACML Framework; 4.5.1 Attribute Support and Management
4.5.2 Delegation4.6 Review and Analysis; References; Appendix A; 5 Next Generation Access Control; 5.1 Introduction; 5.2 Policy and Attribute Elements; 5.3 Relations; 5.3.1 Assignments and Associations; 5.3.2 Prohibitions Denials; 5.3.3 Obligations; 5.4 NGAC Decision Function; 5.5 Delegation of Access Rights; 5.6 NGAC Administrative Commands and Routines; 5.7 Arbitrary Data Service Operations; 5.8 NGAC Functional Architecture; 5.8.1 Resource Access; 5.8.2 Administrative Access; 5.9 Conclusion; References; 6 ABAC Policy Verifications and Testing; 6.1 Introduction; 6.2 ABAC Policy Classes
6.2.1 Static Policy Class6.2.2 Dynamic Policy Class; 6.2.3 Historical Policy Class; 6.3 Access Control Safety and Faults; 6.4 Verification Approaches; 6.4.1 Model Verification; 6.4.2 Coverage and Confinements Semantic Faults; 6.4.3 Property Confinement Checking; 6.4.4 Implementation Test; 6.5 Implementation Considerations*; 6.6 Verification Tools; 6.6.1 Multiterminal Binary Decision Diagrams; 6.6.2 ACPT; 6.6.3 Formal Methods; 6.7 Conclusion; References; 7 Attribute Consideration; 7.1 Introduction; 7.2 ABAC Attributes; 7.3 Consideration Elements; 7.4 Preparation Consideration
Record Nr. UNINA-9910511368203321
Hu Vincent  
Boston, Massachusetts : , : Artech House, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribute-Based Access Control
Attribute-Based Access Control
Autore Hu Vincent
Pubbl/distr/stampa Boston, Massachusetts : , : Artech House, , 2018
Descrizione fisica 1 online resource (285 pages)
Disciplina 005.8
Collana Artech House information security and privacy series
Soggetto topico Computer security
Computers - Access control
Computer networks - Access control
ISBN 1-63081-496-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attribute-Based Access Control; Contents; Preface; Acknowledgements; Intended Audience; 1 Introduction; 1.1 Overview; 1.2 Evolution and Brief History of Access Control; 1.2.1 Academic Contributions; 1.2.2 Military Concerns; 1.2.3 Bell and LaPadula Security Model; 1.2.5 Discontent; 1.2.6 Role-based Access Control; 1.2.7 Emergence of ABAC; References; 2 Access Control Models and Approaches; 2.1 Introduction; 2.2 Terminology; 2.3 Access Control Models and Policies; 2.4 Policy Enforcement; 2.5 Discretionary Access Control; 2.6 Mandatory Access Control Models; 2.6.1 Multilevel Security
2.6.2 Chinese Wall Policy and Model2.6.3 Role-Based Access Control; References; 3 Attribute Based Access Control; 3.1 Introduction; 3.2 ABAC Architectures and Functional Components; 3.3 Logical-Formula and Enumerated ABAC Policy Models; 3.4 ABAC Model-Applications Primatives; 3.5 Hierarchical Group and Attribute-Based Access Control; 3.6 Label-Based ABAC Model with Enumerated Authorization Policy; 3.7 Hybrid Designs Combining Attributes with Roles; 3.8 ABAC and RBAC Hybrid Models; 3.9 Complexities of RBAC Role Structures; 3.10 Complexities of ABAC Rule Sets; 3.11 Dynamic Roles
3.12 Role Centric Structure3.13 Attribute Centric Structure; 3.14 Conclusion; References; 4 ABAC Deployment Using XACML; 4.1 Introduction; 4.2 Business and Technical Drivers for XACML; 4.3 XACML Standard-Components and Their Interactions; 4.3.1 XACML Policy Language Model; 4.3.2 XACML Context (Request and Response); 4.3.3 XACML Framework (Data Flow Model); 4.4 ABAC Deployment Using XACML; 4.4.1 Access Policy Formulation and Encoding; 4.4.2 Request/Response Formulation; 4.4.3 Policy Evaluation and Access Decision; 4.5 Implementation of XACML Framework; 4.5.1 Attribute Support and Management
4.5.2 Delegation4.6 Review and Analysis; References; Appendix A; 5 Next Generation Access Control; 5.1 Introduction; 5.2 Policy and Attribute Elements; 5.3 Relations; 5.3.1 Assignments and Associations; 5.3.2 Prohibitions Denials; 5.3.3 Obligations; 5.4 NGAC Decision Function; 5.5 Delegation of Access Rights; 5.6 NGAC Administrative Commands and Routines; 5.7 Arbitrary Data Service Operations; 5.8 NGAC Functional Architecture; 5.8.1 Resource Access; 5.8.2 Administrative Access; 5.9 Conclusion; References; 6 ABAC Policy Verifications and Testing; 6.1 Introduction; 6.2 ABAC Policy Classes
6.2.1 Static Policy Class6.2.2 Dynamic Policy Class; 6.2.3 Historical Policy Class; 6.3 Access Control Safety and Faults; 6.4 Verification Approaches; 6.4.1 Model Verification; 6.4.2 Coverage and Confinements Semantic Faults; 6.4.3 Property Confinement Checking; 6.4.4 Implementation Test; 6.5 Implementation Considerations*; 6.6 Verification Tools; 6.6.1 Multiterminal Binary Decision Diagrams; 6.6.2 ACPT; 6.6.3 Formal Methods; 6.7 Conclusion; References; 7 Attribute Consideration; 7.1 Introduction; 7.2 ABAC Attributes; 7.3 Consideration Elements; 7.4 Preparation Consideration
Record Nr. UNINA-9910796811703321
Hu Vincent  
Boston, Massachusetts : , : Artech House, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribute-Based Access Control
Attribute-Based Access Control
Autore Hu Vincent
Pubbl/distr/stampa Boston, Massachusetts : , : Artech House, , 2018
Descrizione fisica 1 online resource (285 pages)
Disciplina 005.8
Collana Artech House information security and privacy series
Soggetto topico Computer security
Computers - Access control
Computer networks - Access control
ISBN 1-63081-496-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attribute-Based Access Control; Contents; Preface; Acknowledgements; Intended Audience; 1 Introduction; 1.1 Overview; 1.2 Evolution and Brief History of Access Control; 1.2.1 Academic Contributions; 1.2.2 Military Concerns; 1.2.3 Bell and LaPadula Security Model; 1.2.5 Discontent; 1.2.6 Role-based Access Control; 1.2.7 Emergence of ABAC; References; 2 Access Control Models and Approaches; 2.1 Introduction; 2.2 Terminology; 2.3 Access Control Models and Policies; 2.4 Policy Enforcement; 2.5 Discretionary Access Control; 2.6 Mandatory Access Control Models; 2.6.1 Multilevel Security
2.6.2 Chinese Wall Policy and Model2.6.3 Role-Based Access Control; References; 3 Attribute Based Access Control; 3.1 Introduction; 3.2 ABAC Architectures and Functional Components; 3.3 Logical-Formula and Enumerated ABAC Policy Models; 3.4 ABAC Model-Applications Primatives; 3.5 Hierarchical Group and Attribute-Based Access Control; 3.6 Label-Based ABAC Model with Enumerated Authorization Policy; 3.7 Hybrid Designs Combining Attributes with Roles; 3.8 ABAC and RBAC Hybrid Models; 3.9 Complexities of RBAC Role Structures; 3.10 Complexities of ABAC Rule Sets; 3.11 Dynamic Roles
3.12 Role Centric Structure3.13 Attribute Centric Structure; 3.14 Conclusion; References; 4 ABAC Deployment Using XACML; 4.1 Introduction; 4.2 Business and Technical Drivers for XACML; 4.3 XACML Standard-Components and Their Interactions; 4.3.1 XACML Policy Language Model; 4.3.2 XACML Context (Request and Response); 4.3.3 XACML Framework (Data Flow Model); 4.4 ABAC Deployment Using XACML; 4.4.1 Access Policy Formulation and Encoding; 4.4.2 Request/Response Formulation; 4.4.3 Policy Evaluation and Access Decision; 4.5 Implementation of XACML Framework; 4.5.1 Attribute Support and Management
4.5.2 Delegation4.6 Review and Analysis; References; Appendix A; 5 Next Generation Access Control; 5.1 Introduction; 5.2 Policy and Attribute Elements; 5.3 Relations; 5.3.1 Assignments and Associations; 5.3.2 Prohibitions Denials; 5.3.3 Obligations; 5.4 NGAC Decision Function; 5.5 Delegation of Access Rights; 5.6 NGAC Administrative Commands and Routines; 5.7 Arbitrary Data Service Operations; 5.8 NGAC Functional Architecture; 5.8.1 Resource Access; 5.8.2 Administrative Access; 5.9 Conclusion; References; 6 ABAC Policy Verifications and Testing; 6.1 Introduction; 6.2 ABAC Policy Classes
6.2.1 Static Policy Class6.2.2 Dynamic Policy Class; 6.2.3 Historical Policy Class; 6.3 Access Control Safety and Faults; 6.4 Verification Approaches; 6.4.1 Model Verification; 6.4.2 Coverage and Confinements Semantic Faults; 6.4.3 Property Confinement Checking; 6.4.4 Implementation Test; 6.5 Implementation Considerations*; 6.6 Verification Tools; 6.6.1 Multiterminal Binary Decision Diagrams; 6.6.2 ACPT; 6.6.3 Formal Methods; 6.7 Conclusion; References; 7 Attribute Consideration; 7.1 Introduction; 7.2 ABAC Attributes; 7.3 Consideration Elements; 7.4 Preparation Consideration
Record Nr. UNINA-9910809941403321
Hu Vincent  
Boston, Massachusetts : , : Artech House, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui