E-Book, Englisch, 352 Seiten
Reihe: Chapman & Hall/CRC Cryptography and Network Security Series
Chin / Older Access Control, Security, and Trust
1. Auflage 2011
ISBN: 978-1-4398-9463-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
A Logical Approach
E-Book, Englisch, 352 Seiten
Reihe: Chapman & Hall/CRC Cryptography and Network Security Series
ISBN: 978-1-4398-9463-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.
The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control.
Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Betriebssysteme Virtuelle Maschinen, Virtualisierung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
Access Control, Security, Trust, and Logic
Deconstructing Access Control Decisions
A Logical Approach to Access Control
PRELIMINARIES
A Language for Access Control
Sets and Relations
Syntax
Semantics
Reasoning about Access Control
Logical Rules
Formal Proofs and Theorems
Soundness of Logical Rules
Basic Concepts
Reference Monitors
Access Control Mechanisms: Tickets and Lists
Authentication
Security Policies
Confidentiality, Integrity, and Availability
Discretionary Security Policies
Mandatory Security Policies
Military Security Policies
Commercial Policies
DISTRIBUTED ACCESS CONTROL
Digital Authentication
Public-Key Cryptography
Efficiency Mechanisms
Reasoning about Cryptographic Communications
Certificates, Certificate Authorities, and Trust
Symmetric-Key Cryptography
Delegation
Simple Delegations
Delegation and Its Properties
A Delegation Example: Simple Checking
Networks: Case Studies
SSL and TLS: Authentication across the Web
Kerberos: Authentication for Distributed Systems
Financial Networks
ISOLATION AND SHARING
A Primer on Computer Hardware
Ones and Zeros
Synchronous Design
Microcode
Virtual Machines and Memory Protection
A Simple Processor
Processors with Memory Segmentation
Controlling Access to Memory and Segmentation Registers
Design of the Virtual Machine Monitor
Access Control Using Descriptors and Capabilities
Address Descriptors and Capabilities
Tagged Architectures
Capability Systems
Access Control Using Lists and Rings
Generalized Addresses
Segment Access Controllers
ACL-Based Access Policy for Memory Accesses
Ring-Based Access Control
ACCESS POLICIES
Confidentiality and Integrity Policies
Classifications and Categories
Bell–La Padula Model, Revisited
Confidentiality Levels: Some Practical Considerations
Biba’s Strict Integrity, Revisited
Lipner’s Integrity Model
Role-Based Access Control
RBAC Fundamentals
Separation of Duty
Representing RBAC Systems in the Logic
Appendix: Summary of the Access Control Logic
Index
A Summary and Further Reading appear at the end of each chapter.




