Taylor & Francis GroupTaylor & Francis Group
Search all titles
  • Login
  • Hi, User  
    • Your Account
    • Logout
  • Search all titles
  • Search all collections
Access Control, Security, and Trust
loading
Access Control, Security, and Trust

A Logical Approach

Access Control, Security, and Trust

A Logical Approach

ByShiu-Kai Chin, Susan Beth Older
Edition 1st Edition
First Published 2010
eBook Published 26 July 2010
Pub. location New York
Imprint Chapman and Hall/CRC
DOIhttps://doi.org/10.1201/9781439894637
Pages 352 pages
eBook ISBN 9781439894637
SubjectsComputer Science, Mathematics & Statistics
Get Citation

Get Citation

Chin, S.K., Older, S. (2011). Access Control, Security, and Trust. New York: Chapman and Hall/CRC, https://doi.org/10.1201/9781439894637
ABOUT THIS BOOK

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple pro

TABLE OF CONTENTS
chapter 1|8 pages
Access Control, Security, Trust, and Logic
View abstract
part 1|2 pages
Part I: Preliminaries
chapter 2|28 pages
A Language for Access Control
View abstract
chapter 3|18 pages
Reasoning about Access Control
View abstract
chapter 4|20 pages
Basic Concepts
View abstract
chapter 5|30 pages
Security Policies
View abstract
part 2|2 pages
Part II: Distributed Access Control
chapter 6|24 pages
Digital Authentication
View abstract
chapter 7|16 pages
Delegation
View abstract
chapter 8|26 pages
Networks: Case Studies
View abstract
part 3|2 pages
Part III: Isolation and Sharing
chapter 9|20 pages
A Primer on Computer Hardware
View abstract
chapter 10|30 pages
Virtual Machines and Memory Protection
View abstract
chapter 11|18 pages
Access Control Using Descriptors and Capabilities
View abstract
chapter 12|16 pages
Access Control Using Lists and Rings
View abstract
part 4|2 pages
Part IV: Access Policies
chapter 13|26 pages
Confidentiality and Integrity Policies
View abstract
chapter 14|24 pages
Role-Based Access Control
View abstract

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple pro

TABLE OF CONTENTS
chapter 1|8 pages
Access Control, Security, Trust, and Logic
View abstract
part 1|2 pages
Part I: Preliminaries
chapter 2|28 pages
A Language for Access Control
View abstract
chapter 3|18 pages
Reasoning about Access Control
View abstract
chapter 4|20 pages
Basic Concepts
View abstract
chapter 5|30 pages
Security Policies
View abstract
part 2|2 pages
Part II: Distributed Access Control
chapter 6|24 pages
Digital Authentication
View abstract
chapter 7|16 pages
Delegation
View abstract
chapter 8|26 pages
Networks: Case Studies
View abstract
part 3|2 pages
Part III: Isolation and Sharing
chapter 9|20 pages
A Primer on Computer Hardware
View abstract
chapter 10|30 pages
Virtual Machines and Memory Protection
View abstract
chapter 11|18 pages
Access Control Using Descriptors and Capabilities
View abstract
chapter 12|16 pages
Access Control Using Lists and Rings
View abstract
part 4|2 pages
Part IV: Access Policies
chapter 13|26 pages
Confidentiality and Integrity Policies
View abstract
chapter 14|24 pages
Role-Based Access Control
View abstract
CONTENTS
ABOUT THIS BOOK

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple pro

TABLE OF CONTENTS
chapter 1|8 pages
Access Control, Security, Trust, and Logic
View abstract
part 1|2 pages
Part I: Preliminaries
chapter 2|28 pages
A Language for Access Control
View abstract
chapter 3|18 pages
Reasoning about Access Control
View abstract
chapter 4|20 pages
Basic Concepts
View abstract
chapter 5|30 pages
Security Policies
View abstract
part 2|2 pages
Part II: Distributed Access Control
chapter 6|24 pages
Digital Authentication
View abstract
chapter 7|16 pages
Delegation
View abstract
chapter 8|26 pages
Networks: Case Studies
View abstract
part 3|2 pages
Part III: Isolation and Sharing
chapter 9|20 pages
A Primer on Computer Hardware
View abstract
chapter 10|30 pages
Virtual Machines and Memory Protection
View abstract
chapter 11|18 pages
Access Control Using Descriptors and Capabilities
View abstract
chapter 12|16 pages
Access Control Using Lists and Rings
View abstract
part 4|2 pages
Part IV: Access Policies
chapter 13|26 pages
Confidentiality and Integrity Policies
View abstract
chapter 14|24 pages
Role-Based Access Control
View abstract

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple pro

TABLE OF CONTENTS
chapter 1|8 pages
Access Control, Security, Trust, and Logic
View abstract
part 1|2 pages
Part I: Preliminaries
chapter 2|28 pages
A Language for Access Control
View abstract
chapter 3|18 pages
Reasoning about Access Control
View abstract
chapter 4|20 pages
Basic Concepts
View abstract
chapter 5|30 pages
Security Policies
View abstract
part 2|2 pages
Part II: Distributed Access Control
chapter 6|24 pages
Digital Authentication
View abstract
chapter 7|16 pages
Delegation
View abstract
chapter 8|26 pages
Networks: Case Studies
View abstract
part 3|2 pages
Part III: Isolation and Sharing
chapter 9|20 pages
A Primer on Computer Hardware
View abstract
chapter 10|30 pages
Virtual Machines and Memory Protection
View abstract
chapter 11|18 pages
Access Control Using Descriptors and Capabilities
View abstract
chapter 12|16 pages
Access Control Using Lists and Rings
View abstract
part 4|2 pages
Part IV: Access Policies
chapter 13|26 pages
Confidentiality and Integrity Policies
View abstract
chapter 14|24 pages
Role-Based Access Control
View abstract
ABOUT THIS BOOK
ABOUT THIS BOOK

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple pro

TABLE OF CONTENTS
chapter 1|8 pages
Access Control, Security, Trust, and Logic
View abstract
part 1|2 pages
Part I: Preliminaries
chapter 2|28 pages
A Language for Access Control
View abstract
chapter 3|18 pages
Reasoning about Access Control
View abstract
chapter 4|20 pages
Basic Concepts
View abstract
chapter 5|30 pages
Security Policies
View abstract
part 2|2 pages
Part II: Distributed Access Control
chapter 6|24 pages
Digital Authentication
View abstract
chapter 7|16 pages
Delegation
View abstract
chapter 8|26 pages
Networks: Case Studies
View abstract
part 3|2 pages
Part III: Isolation and Sharing
chapter 9|20 pages
A Primer on Computer Hardware
View abstract
chapter 10|30 pages
Virtual Machines and Memory Protection
View abstract
chapter 11|18 pages
Access Control Using Descriptors and Capabilities
View abstract
chapter 12|16 pages
Access Control Using Lists and Rings
View abstract
part 4|2 pages
Part IV: Access Policies
chapter 13|26 pages
Confidentiality and Integrity Policies
View abstract
chapter 14|24 pages
Role-Based Access Control
View abstract

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple pro

TABLE OF CONTENTS
chapter 1|8 pages
Access Control, Security, Trust, and Logic
View abstract
part 1|2 pages
Part I: Preliminaries
chapter 2|28 pages
A Language for Access Control
View abstract
chapter 3|18 pages
Reasoning about Access Control
View abstract
chapter 4|20 pages
Basic Concepts
View abstract
chapter 5|30 pages
Security Policies
View abstract
part 2|2 pages
Part II: Distributed Access Control
chapter 6|24 pages
Digital Authentication
View abstract
chapter 7|16 pages
Delegation
View abstract
chapter 8|26 pages
Networks: Case Studies
View abstract
part 3|2 pages
Part III: Isolation and Sharing
chapter 9|20 pages
A Primer on Computer Hardware
View abstract
chapter 10|30 pages
Virtual Machines and Memory Protection
View abstract
chapter 11|18 pages
Access Control Using Descriptors and Capabilities
View abstract
chapter 12|16 pages
Access Control Using Lists and Rings
View abstract
part 4|2 pages
Part IV: Access Policies
chapter 13|26 pages
Confidentiality and Integrity Policies
View abstract
chapter 14|24 pages
Role-Based Access Control
View abstract
Taylor & Francis Group
Policies
  • Privacy Policy
  • Terms & Conditions
  • Cookie Policy
Journals
  • Taylor & Francis Online
  • CogentOA
Corporate
  • Taylor & Francis
    Group
  • Taylor & Francis Group
Help & Contact
  • Students/Researchers
  • Librarians/Institutions

Connect with us

Registered in England & Wales No. 3099067
5 Howick Place | London | SW1P 1WG © 2018 Informa UK Limited