|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_ocn908079522 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
150509s2010 xx ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCO
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d MERUC
|d KIJ
|d N$T
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d OTZ
|d TYFRS
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781439894637
|q (electronic bk.)
|
020 |
|
|
|a 1439894639
|q (electronic bk.)
|
024 |
7 |
|
|a 10.1201/9781439894637
|2 doi
|
029 |
1 |
|
|a AU@
|b 000056086547
|
029 |
1 |
|
|a DEBSZ
|b 456557741
|
035 |
|
|
|a (OCoLC)908079522
|
050 |
|
4 |
|a QA76.9.A25 C446 2010
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a PBCD
|2 bicscc
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Chin, Shiu-Kai.
|
245 |
1 |
0 |
|a Access Control, Security, and Trust :
|b a Logical Approach.
|
260 |
|
|
|a Hoboken :
|b CRC Press,
|c 2010.
|
300 |
|
|
|a 1 online resource (348 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Chapman & Hall/CRC Cryptography and Network Security Series
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection.
|
505 |
8 |
|
|a Chapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover.
|
520 |
|
|
|a Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a System design.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Conception de systèmes.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
650 |
|
7 |
|a System design
|2 fast
|
700 |
1 |
|
|a Older, Susan Beth.
|
758 |
|
|
|i has work:
|a Access control, security, and trust (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGj6MrtVvDWrmYfwHf6mbb
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Chin, Shiu-Kai.
|t Access Control, Security, and Trust : A Logical Approach.
|d Hoboken : CRC Press, ©2010
|z 9781584888628
|
830 |
|
0 |
|a Chapman & Hall/CRC cryptography and network security.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1648320
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL1648320
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1728703
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429184437
|
994 |
|
|
|a 92
|b IZTAP
|