|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBOOKCENTRAL_on1027672206 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
171213s2018 mau ob 001 0 eng d |
010 |
|
|
|a 2017285744
|
040 |
|
|
|a STF
|b eng
|e pn
|c STF
|d OCLCQ
|d EBLCP
|d N$T
|d YDX
|d CUV
|d OCLCF
|d OCLCQ
|d OCLCO
|d K6U
|d IEEEE
|d VT2
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1039926988
|a 1294656863
|
020 |
|
|
|a 9781630814960
|q (electronic bk.)
|
020 |
|
|
|a 1630814962
|q (electronic bk.)
|
020 |
|
|
|z 9781630811341
|
020 |
|
|
|z 1630811343
|
035 |
|
|
|a (OCoLC)1027672206
|z (OCoLC)1039926988
|z (OCoLC)1294656863
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hu, Vincent.
|
245 |
1 |
0 |
|a Attribute-Based Access Control.
|
260 |
|
|
|a Boston, MA :
|b Artech House,
|c 2018.
|
300 |
|
|
|a 1 online resource (285 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Artech House information security and privacy series
|
520 |
3 |
|
|a This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well as deployment challenges.n nReaders find authoritative insight into specialized topics including formal ABAC history, ABAC's relationship with other access control models, ABAC model validation and analysis, verification and testing, and deployment frameworks such as XACML. Next Generation Access Model (NGAC) is explained, along with attribute considerations in implementation. The book explores ABAC applications in SOA/workflow domains, ABAC architectures, and includes details on feature sets in commercial and open source products. This insightful resource presents a combination of technical and administrative information for models, standards, and products that will benefit researchers as well as implementers of ABAC systems in the field.
|c Publisher abstract.
|
588 |
0 |
|
|a Publisher's metadata.
|
505 |
0 |
|
|a Attribute-Based Access Control; Contents; Preface; Acknowledgements; Intended Audience; 1 Introduction; 1.1 Overview; 1.2 Evolution and Brief History of Access Control; 1.2.1 Academic Contributions; 1.2.2 Military Concerns; 1.2.3 Bell and LaPadula Security Model; 1.2.5 Discontent; 1.2.6 Role-based Access Control; 1.2.7 Emergence of ABAC; References; 2 Access Control Models and Approaches; 2.1 Introduction; 2.2 Terminology; 2.3 Access Control Models and Policies; 2.4 Policy Enforcement; 2.5 Discretionary Access Control; 2.6 Mandatory Access Control Models; 2.6.1 Multilevel Security
|
505 |
8 |
|
|a 2.6.2 Chinese Wall Policy and Model2.6.3 Role-Based Access Control; References; 3 Attribute Based Access Control; 3.1 Introduction; 3.2 ABAC Architectures and Functional Components; 3.3 Logical-Formula and Enumerated ABAC Policy Models; 3.4 ABAC Model-Applications Primatives; 3.5 Hierarchical Group and Attribute-Based Access Control; 3.6 Label-Based ABAC Model with Enumerated Authorization Policy; 3.7 Hybrid Designs Combining Attributes with Roles; 3.8 ABAC and RBAC Hybrid Models; 3.9 Complexities of RBAC Role Structures; 3.10 Complexities of ABAC Rule Sets; 3.11 Dynamic Roles
|
505 |
8 |
|
|a 3.12 Role Centric Structure3.13 Attribute Centric Structure; 3.14 Conclusion; References; 4 ABAC Deployment Using XACML; 4.1 Introduction; 4.2 Business and Technical Drivers for XACML; 4.3 XACML Standard-Components and Their Interactions; 4.3.1 XACML Policy Language Model; 4.3.2 XACML Context (Request and Response); 4.3.3 XACML Framework (Data Flow Model); 4.4 ABAC Deployment Using XACML; 4.4.1 Access Policy Formulation and Encoding; 4.4.2 Request/Response Formulation; 4.4.3 Policy Evaluation and Access Decision; 4.5 Implementation of XACML Framework; 4.5.1 Attribute Support and Management
|
505 |
8 |
|
|a 4.5.2 Delegation4.6 Review and Analysis; References; Appendix A; 5 Next Generation Access Control; 5.1 Introduction; 5.2 Policy and Attribute Elements; 5.3 Relations; 5.3.1 Assignments and Associations; 5.3.2 Prohibitions Denials; 5.3.3 Obligations; 5.4 NGAC Decision Function; 5.5 Delegation of Access Rights; 5.6 NGAC Administrative Commands and Routines; 5.7 Arbitrary Data Service Operations; 5.8 NGAC Functional Architecture; 5.8.1 Resource Access; 5.8.2 Administrative Access; 5.9 Conclusion; References; 6 ABAC Policy Verifications and Testing; 6.1 Introduction; 6.2 ABAC Policy Classes
|
505 |
8 |
|
|a 6.2.1 Static Policy Class6.2.2 Dynamic Policy Class; 6.2.3 Historical Policy Class; 6.3 Access Control Safety and Faults; 6.4 Verification Approaches; 6.4.1 Model Verification; 6.4.2 Coverage and Confinements Semantic Faults; 6.4.3 Property Confinement Checking; 6.4.4 Implementation Test; 6.5 Implementation Considerations*; 6.6 Verification Tools; 6.6.1 Multiterminal Binary Decision Diagrams; 6.6.2 ACPT; 6.6.3 Formal Methods; 6.7 Conclusion; References; 7 Attribute Consideration; 7.1 Introduction; 7.2 ABAC Attributes; 7.3 Consideration Elements; 7.4 Preparation Consideration
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Access control
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
758 |
|
|
|i has work:
|a Attribute-based access control (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGm4H4tvw7JqX4hXwMpJTb
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Hu, Vincent C.
|t Attribute-based access control.
|d Norwood, MA : Artech House, [2018]
|z 9781630811341
|w (OCoLC)1019564310
|
830 |
|
0 |
|a Artech House information security and privacy series.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5430722
|z Texto completo
|
938 |
|
|
|a IEEE
|b IEEE
|n 9100400
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5430722
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1825932
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15503374
|
994 |
|
|
|a 92
|b IZTAP
|