Access Control, Security, And Trust: A Logical Approach (chapman & Hall/crc Cryptography And Network Security Series)
by Shiu-Kai Chin /
2010 / English / PDF
28.4 MB Download
Developed from the authors’ courses at Syracuse University and
the U.S. Air Force Research Laboratory,
Developed from the authors’ courses at Syracuse University and
the U.S. Air Force Research Laboratory,Access Control,
Security, and Trust: A Logical Approach
Access Control,
Security, and Trust: A Logical Approach equips readers
with an access control logic they can use to specify and verify
their security designs. Throughout the text, the authors use a
single access control logic based on a simple propositional modal
logic.
equips readers
with an access control logic they can use to specify and verify
their security designs. Throughout the text, the authors use a
single access control logic based on a simple propositional modal
logic.
The first part of the book presents the syntax and semantics of
access control logic, basic access control concepts, and an
introduction to confidentiality and integrity policies. The
second section covers access control in networks, delegation,
protocols, and the use of cryptography. In the third section, the
authors focus on hardware and virtual machines. The final part
discusses confidentiality, integrity, and role-based access
control.
The first part of the book presents the syntax and semantics of
access control logic, basic access control concepts, and an
introduction to confidentiality and integrity policies. The
second section covers access control in networks, delegation,
protocols, and the use of cryptography. In the third section, the
authors focus on hardware and virtual machines. The final part
discusses confidentiality, integrity, and role-based access
control.
Taking a logical, rigorous approach to access control, this book
shows how logic is a useful tool for analyzing security designs
and spelling out the conditions upon which access control
decisions depend. It is designed for computer engineers and
computer scientists who are responsible for designing,
implementing, and verifying secure computer and information
systems.
Taking a logical, rigorous approach to access control, this book
shows how logic is a useful tool for analyzing security designs
and spelling out the conditions upon which access control
decisions depend. It is designed for computer engineers and
computer scientists who are responsible for designing,
implementing, and verifying secure computer and information
systems.