Access control, security, and trust : a logical approach / / by Shiu-Kai Chin and Susan Beth Older |
Autore | Chin Shiu-Kai |
Edizione | [First edition.] |
Pubbl/distr/stampa | Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2010 |
Descrizione fisica | 1 online resource (348 p.) |
Disciplina | 005.8 |
Collana | Chapman & Hall/CRC Cryptography and Network Security |
Soggetto topico |
Computers - Access control
System design |
Soggetto genere / forma | Electronic books. |
ISBN |
0-429-18443-3
1-4398-9463-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection
Chapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover |
Record Nr. | UNINA-9910460736103321 |
Chin Shiu-Kai
![]() |
||
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Access control, security, and trust : a logical approach / / by Shiu-Kai Chin and Susan Beth Older |
Autore | Chin Shiu-Kai |
Edizione | [First edition.] |
Pubbl/distr/stampa | Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2010 |
Descrizione fisica | 1 online resource (348 p.) |
Disciplina | 005.8 |
Collana | Chapman & Hall/CRC Cryptography and Network Security |
Soggetto topico |
Computers - Access control
System design |
ISBN |
1-4398-9155-9
0-429-18443-3 1-4398-9463-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection
Chapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover |
Record Nr. | UNINA-9910797026503321 |
Chin Shiu-Kai
![]() |
||
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Access control, security, and trust : a logical approach / / by Shiu-Kai Chin and Susan Beth Older |
Autore | Chin Shiu-Kai |
Edizione | [First edition.] |
Pubbl/distr/stampa | Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2010 |
Descrizione fisica | 1 online resource (348 p.) |
Disciplina | 005.8 |
Collana | Chapman & Hall/CRC Cryptography and Network Security |
Soggetto topico |
Computers - Access control
System design |
ISBN |
1-4398-9155-9
0-429-18443-3 1-4398-9463-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection
Chapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover |
Record Nr. | UNINA-9910819298503321 |
Chin Shiu-Kai
![]() |
||
Boca Raton, FL : , : Chapman and Hall/CRC, an imprint of Taylor and Francis, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|