Access Control, Security, and Trust: A Logical Approach (Chapman & Hall/CRC Cryptography and Network Security Series) 🔍
Chin, Shiu-Kai; Older, Susan Beth CRC Press LLC, Chapman & Hall/CRC cryptography and network security, First edition, Boca Raton, FL, 2010
英语 [en] · PDF · 29.8MB · 2010 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
"Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic
备用文件名
lgrsnf/G:\!genesis\_add\!woodhead\!\eblib\Access Control, Security, and Trust - A Logical Approach - 1648320-348.pdf
备用文件名
nexusstc/Access Control, Security, and Trust : A Logical Approach/64068caf65e594300b6e265cd02d655a.pdf
备用文件名
zlib/Science (General)/Chin, Shiu-Kai; Older, Susan Beth/Access Control, Security, and Trust : A Logical Approach_2572928.pdf
备选作者
Shiu-Kai Chin; Susan Beth Older
备用出版商
Taylor and Francis, an imprint of Chapman and Hall/CRC
备用出版商
Taylor & Francis Group
备用版本
Chapman & Hall/CRC cryptography and network security, Boca Raton, 2011
备用版本
Chapman & Hall, Online-ausg, Hoboken, 2010
备用版本
United States, United States of America
备用版本
CRC Press (Unlimited), Hoboken, 2010
备用版本
1, 20100726
元数据中的注释
lg1378796
元数据中的注释
{"isbns":["1439894639","1584888636","9781439894637","9781584888635"],"last_page":348,"publisher":"CRC Press","series":"Chapman & Hall/CRC cryptography and network security"}
备用描述
Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti
备用描述
Front cover; Contents; List of Tables; List of Figures; Preface; Chapter 1. Access Control, Security, Trust, and Logic; Part I: Preliminaries; Chapter 2. A Language for Access Control; Chapter 3. Reasoning about Access Control; Chapter 4. Basic Concepts; Chapter 5. Security Policies; Part II: Distributed Access Control; Chapter 6. Digital Authentication; Chapter 7. Delegation; Chapter 8. Networks: Case Studies; Part III: Isolation and Sharing; Chapter 9. A Primer on Computer Hardware; Chapter 10. Virtual Machines and Memory Protection
备用描述
The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control
备用描述
Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems."--Pub. desc
备用描述
Using propositional modal logic to explain access control principles, this work presents the mathematical means to comprehend, analyze, create, and verify the policies and control mechanisms used to protect resources. It covers distributed access control, resources and sharing, and security monitors. It is suitable for computer engineers.
备用描述
Chapter 11. Access Control Using Descriptors and CapabilitiesChapter 12. Access Control Using Lists and Rings; Part IV: Access Policies; Chapter 13. Confidentiality and Integrity Policies; Chapter 14. Role-Based Access Control; Appendix A; Summary of the Access-Control Logic; Bibliography; Notation Index; Back cover
开源日期
2015-07-19
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。