website statistics Access Control, Security, And Trust: A Logical Approach (Chapman & Hall/Crc Cryptography And Network Security Series) - PDF Books Online
Hot Best Seller

Access Control, Security, And Trust: A Logical Approach (Chapman & Hall/Crc Cryptography And Network Security Series)

Availability: Ready to download

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. Th Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control. Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.


Compare

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. Th Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control. Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.

16 review for Access Control, Security, And Trust: A Logical Approach (Chapman & Hall/Crc Cryptography And Network Security Series)

  1. 4 out of 5

    Mohammad Efazati

    واقعا جا داشت خیلی بهتر باشه ولی حدود دید دقیقی نسبت به بعضی مسائل میداد. حجم ریاضیاتش بعضا خسته کننده میشد.

  2. 5 out of 5

    Sheffielder

    It's a real pleasure to see proper mathematical specification being used for such an important topic. The authors describe a basic logical language for specifying and reasoning about access control properties, and even include such topics as Kripke semantics. Doing justice to the material would require more time than is available in a general security module, but this is certainly a book to have in the library. It's a real pleasure to see proper mathematical specification being used for such an important topic. The authors describe a basic logical language for specifying and reasoning about access control properties, and even include such topics as Kripke semantics. Doing justice to the material would require more time than is available in a general security module, but this is certainly a book to have in the library.

  3. 5 out of 5

    Aidin

  4. 4 out of 5

    Paul Ratazzi

  5. 5 out of 5

    Ashish Singh

  6. 4 out of 5

    Preeti

  7. 5 out of 5

    Mythili Sivasankar

  8. 4 out of 5

    Okhumale Igetei

  9. 5 out of 5

    Erka Kh

  10. 5 out of 5

    Martin

  11. 4 out of 5

    Anton

  12. 4 out of 5

    Sade C.

  13. 5 out of 5

    Mohammad Jafar

  14. 4 out of 5

    Sindhu Sabbineni

  15. 5 out of 5

    Nimish Sogani

  16. 4 out of 5

    Rolando

Add a review

Your email address will not be published. Required fields are marked *

Loading...
We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.