Access Control, Security, and Trust: A Logical Approach

Access Control, Security, and Trust: A Logical Approach

English | 2010 | ISBN: 1584888628 | PDF | 348 Pages | 28.4 mb


Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.

The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control.

Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.

Download:

http://longfiles.com/17738/

[Fast Download] Access Control, Security, and Trust: A Logical Approach


Related eBooks:
The Men Who Stare at Goats
Encounter in the Pleiades: An Inside Look at Ufo's
Information Theoretic Security and Privacy of Information Systems
Unpacking Construction Site Safety
Learn Password, WiFi, OS Hack - Starter Guide
Securing Cloud Services
Automating security assessments with AWS Inspector
IT Security Risk Control Management: An Audit Preparation Plan
Transactions on Data Hiding and Multimedia Security X
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
CCNA Security 210-260 Certification Guide
Security Breaches and Threat Prevention in the Internet of Things
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.