Access control, security, and trust : a logical approach /: a logical approach. (2010)
- Record Type:
- Book
- Title:
- Access control, security, and trust : a logical approach /: a logical approach. (2010)
- Main Title:
- Access control, security, and trust : a logical approach
- Further Information:
- Note: By Shiu-Kai Chin, Susan Beth Older.
- Other Names:
- Chin, Shiu-Kai
Older, Susan - Contents:
- Access Control, Security, Trust, and Logic ; Deconstructing Access Control Decisions; A Logical Approach to Access Control PRELIMINARIES; A Language for Access Control ; Sets and Relations; Syntax; Semantics Reasoning about Access Control ; Logical Rules; Formal Proofs and Theorems; Soundness of Logical Rules Basic Concepts; Reference Monitors; Access Control Mechanisms: Tickets and Lists; Authentication Security Policies ; Confidentiality, Integrity, and Availability; Discretionary Security Policies; Mandatory Security Policies; Military Security Policies; Commercial Policies DISTRIBUTED ACCESS CONTROL; Digital Authentication; Public-Key Cryptography; Efficiency Mechanisms; Reasoning about Cryptographic Communications; Certificates, Certificate Authorities, and Trust; Symmetric-Key Cryptography Delegation; Simple Delegations; Delegation and Its Properties; A Delegation Example: Simple Checking Networks: Case Studies; SSL and TLS: Authentication across the Web; Kerberos: Authentication for Distributed Systems; Financial Networks ISOLATION AND SHARING; A Primer on Computer Hardware; Ones and Zeros; Synchronous Design; Microcode Virtual Machines and Memory Protection ; A Simple Processor; Processors with Memory Segmentation; Controlling Access to Memory and Segmentation Registers; Design of the Virtual Machine Monitor Access Control Using Descriptors and Capabilities ; Address Descriptors and Capabilities; Tagged Architectures; Capability Systems Access Control Using Lists andAccess Control, Security, Trust, and Logic ; Deconstructing Access Control Decisions; A Logical Approach to Access Control PRELIMINARIES; A Language for Access Control ; Sets and Relations; Syntax; Semantics Reasoning about Access Control ; Logical Rules; Formal Proofs and Theorems; Soundness of Logical Rules Basic Concepts; Reference Monitors; Access Control Mechanisms: Tickets and Lists; Authentication Security Policies ; Confidentiality, Integrity, and Availability; Discretionary Security Policies; Mandatory Security Policies; Military Security Policies; Commercial Policies DISTRIBUTED ACCESS CONTROL; Digital Authentication; Public-Key Cryptography; Efficiency Mechanisms; Reasoning about Cryptographic Communications; Certificates, Certificate Authorities, and Trust; Symmetric-Key Cryptography Delegation; Simple Delegations; Delegation and Its Properties; A Delegation Example: Simple Checking Networks: Case Studies; SSL and TLS: Authentication across the Web; Kerberos: Authentication for Distributed Systems; Financial Networks ISOLATION AND SHARING; A Primer on Computer Hardware; Ones and Zeros; Synchronous Design; Microcode Virtual Machines and Memory Protection ; A Simple Processor; Processors with Memory Segmentation; Controlling Access to Memory and Segmentation Registers; Design of the Virtual Machine Monitor Access Control Using Descriptors and Capabilities ; Address Descriptors and Capabilities; Tagged Architectures; Capability Systems Access Control Using Lists and Rings; Generalized Addresses ; Segment Access Controllers; ACL-Based Access Policy for Memory Accesses; Ring-Based Access Control ACCESS POLICIES; Confidentiality and Integrity Policies ; Classifications and Categories; Bell–La Padula Model, Revisited; Confidentiality Levels: Some Practical Considerations; Biba’s Strict Integrity, Revisited; Lipner’s Integrity Model Role-Based Access Control ; RBAC Fundamentals; Separation of Duty; Representing RBAC Systems in the Logic Appendix: Summary of the Access Control Logic Index A Summary and Further Reading appear at the end of each chapter. … (more)
- Publisher Details:
- Place of publication not identified : Chapman and Hall/CRC
- Publication Date:
- 2010
- Extent:
- 1 online resource (352 pages), (93 illustrations)
- Subjects:
- 005.8
Computer security
Modality (Logic) - Languages:
- English
- ISBNs:
- 9781439894637
1439894639 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.148671
- Ingest File:
- 02_091.xml