ABSTRACT

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple pro

part 1|2 pages

Part I: Preliminaries

chapter 2|28 pages

A Language for Access Control

chapter 3|18 pages

Reasoning about Access Control

chapter 4|20 pages

Basic Concepts

chapter 5|30 pages

Security Policies

part 2|2 pages

Part II: Distributed Access Control

chapter 6|24 pages

Digital Authentication

chapter 7|16 pages

Delegation

chapter 8|26 pages

Networks: Case Studies

part 3|2 pages

Part III: Isolation and Sharing

chapter 9|20 pages

A Primer on Computer Hardware

chapter 10|30 pages

Virtual Machines and Memory Protection

chapter 12|16 pages

Access Control Using Lists and Rings

part 4|2 pages

Part IV: Access Policies

chapter 13|26 pages

Confidentiality and Integrity Policies

chapter 14|24 pages

Role-Based Access Control