Cargando…

Access Control, Security, and Trust : a Logical Approach.

Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Chin, Shiu-Kai
Otros Autores: Older, Susan Beth
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : CRC Press, 2010.
Colección:Chapman & Hall/CRC cryptography and network security.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn908079522
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 150509s2010 xx ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCO  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d MERUC  |d KIJ  |d N$T  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d OTZ  |d TYFRS  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781439894637  |q (electronic bk.) 
020 |a 1439894639  |q (electronic bk.) 
024 7 |a 10.1201/9781439894637  |2 doi 
029 1 |a AU@  |b 000056086547 
029 1 |a DEBSZ  |b 456557741 
035 |a (OCoLC)908079522 
050 4 |a QA76.9.A25 C446 2010 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a PBCD  |2 bicscc 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Chin, Shiu-Kai. 
245 1 0 |a Access Control, Security, and Trust :  |b a Logical Approach. 
260 |a Hoboken :  |b CRC Press,  |c 2010. 
300 |a 1 online resource (348 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Chapman & Hall/CRC Cryptography and Network Security Series 
588 0 |a Print version record. 
505 0 |a Front cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection. 
505 8 |a Chapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover. 
520 |a Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti. 
504 |a Includes bibliographical references and index. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computers  |x Access control. 
650 0 |a System design. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Conception de systèmes. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a System design  |2 fast 
700 1 |a Older, Susan Beth. 
758 |i has work:  |a Access control, security, and trust (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGj6MrtVvDWrmYfwHf6mbb  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Chin, Shiu-Kai.  |t Access Control, Security, and Trust : A Logical Approach.  |d Hoboken : CRC Press, ©2010  |z 9781584888628 
830 0 |a Chapman & Hall/CRC cryptography and network security. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1648320  |z Texto completo 
936 |a BATCHLOAD 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1648320 
938 |a EBSCOhost  |b EBSC  |n 1728703 
938 |a Taylor & Francis  |b TAFR  |n 9780429184437 
994 |a 92  |b IZTAP