Cargando…

Access Control, Security, and Trust : a Logical Approach.

Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Chin, Shiu-Kai
Otros Autores: Older, Susan Beth
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : CRC Press, 2010.
Colección:Chapman & Hall/CRC cryptography and network security.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection.
  • Chapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover.