Cantitate/Preț
Produs

Access Control, Security, and Trust: A Logical Approach: Chapman & Hall/CRC Cryptography and Network Security Series

Autor Shiu-Kai Chin, Susan Beth Older
en Limba Engleză Hardback – 26 iul 2010
Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.
The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control.
Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 32934 lei  6-8 săpt.
  CRC Press – 14 oct 2024 32934 lei  6-8 săpt.
Hardback (1) 81813 lei  6-8 săpt.
  CRC Press – 26 iul 2010 81813 lei  6-8 săpt.

Din seria Chapman & Hall/CRC Cryptography and Network Security Series

Preț: 81813 lei

Preț vechi: 102266 lei
-20% Nou

Puncte Express: 1227

Preț estimativ în valută:
15669 16143$ 13126£

Carte tipărită la comandă

Livrare economică 24 februarie-10 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781584888628
ISBN-10: 1584888628
Pagini: 352
Ilustrații: 93 b/w images and 33 tables
Dimensiuni: 156 x 234 x 23 mm
Greutate: 0.64 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Chapman & Hall/CRC Cryptography and Network Security Series


Public țintă

Undergraduate

Cuprins

Preliminaries. Distributed Access Control. Isolation and Sharing. Access Policies. Appendix. Index.

Notă biografică

Shiu-Kai Chin is a Meredith Professor in the Department of Electrical Engineering and Computer Science at Syracuse University. He is also director of the Center for Information and Systems Assurance and Trust. While at Syracuse, Dr. Chin has received the Outstanding Teacher Award, the Chancellor’s Citation for Outstanding Contributions to the University’s Academic Programs, and the Crouse Hinds Award for Excellence in Education.
Susan Older is an associate professor in the Department of Electrical Engineering and Computer Science at Syracuse University. She is also the program director for the Certificate of Advanced Study in Systems Assurance. Dr. Older’s research interests include programming-language semantics, logics of programs, formal methods, and information-assurance and computer science education.

Recenzii

Focusing on the logic of access control, more than on actual computer programming, this volume is designed as a textbook for undergraduates. Each chapter ends with exercises and a concise description of expected learning outcomes. The authors, both in electrical engineering and computer science at Syracuse University, also teach an intensive summer course on access control for hundreds of ROTC cadets. It contains a useful selection of tables and figures, a notation index and a brief bibliography.
SciTech Book News, February 2011

Descriere

This book equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control.