Chin / Older | Access Control, Security, and Trust | E-Book | www.sack.de
E-Book

Chin / Older Access Control, Security, and Trust

A Logical Approach
1. Auflage 2011
ISBN: 978-1-4398-9463-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

A Logical Approach

E-Book, Englisch, 352 Seiten

Reihe: Chapman & Hall/CRC Cryptography and Network Security Series

ISBN: 978-1-4398-9463-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.

The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control.

Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.

Chin / Older Access Control, Security, and Trust jetzt bestellen!

Weitere Infos & Material


Access Control, Security, Trust, and Logic

Deconstructing Access Control Decisions

A Logical Approach to Access Control

PRELIMINARIES

A Language for Access Control
Sets and Relations

Syntax

Semantics

Reasoning about Access Control

Logical Rules
Formal Proofs and Theorems

Soundness of Logical Rules

Basic Concepts

Reference Monitors

Access Control Mechanisms: Tickets and Lists

Authentication

Security Policies
Confidentiality, Integrity, and Availability

Discretionary Security Policies

Mandatory Security Policies

Military Security Policies

Commercial Policies

DISTRIBUTED ACCESS CONTROL

Digital Authentication

Public-Key Cryptography

Efficiency Mechanisms
Reasoning about Cryptographic Communications

Certificates, Certificate Authorities, and Trust

Symmetric-Key Cryptography

Delegation

Simple Delegations

Delegation and Its Properties

A Delegation Example: Simple Checking

Networks: Case Studies

SSL and TLS: Authentication across the Web

Kerberos: Authentication for Distributed Systems

Financial Networks

ISOLATION AND SHARING

A Primer on Computer Hardware

Ones and Zeros

Synchronous Design
Microcode

Virtual Machines and Memory Protection

A Simple Processor

Processors with Memory Segmentation

Controlling Access to Memory and Segmentation Registers

Design of the Virtual Machine Monitor

Access Control Using Descriptors and Capabilities

Address Descriptors and Capabilities

Tagged Architectures

Capability Systems

Access Control Using Lists and Rings
Generalized Addresses

Segment Access Controllers

ACL-Based Access Policy for Memory Accesses

Ring-Based Access Control
ACCESS POLICIES

Confidentiality and Integrity Policies

Classifications and Categories

Bell–La Padula Model, Revisited

Confidentiality Levels: Some Practical Considerations

Biba’s Strict Integrity, Revisited

Lipner’s Integrity Model
Role-Based Access Control

RBAC Fundamentals

Separation of Duty

Representing RBAC Systems in the Logic
Appendix: Summary of the Access Control Logic
Index
A Summary and Further Reading appear at the end of each chapter.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.