Access Control, Security, and Trust: A Logical ApproachDeveloped from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple pro |
Contents
Chapter 1 Access Control Security Trust and Logic | 1 |
Preliminaries | 9 |
Chapter 2 A Language for Access Control | 11 |
Chapter 3 Reasoning about Access Control | 39 |
Chapter 4 Basic Concepts | 57 |
Chapter 5 Security Policies | 77 |
Distributed Access Control | 107 |
Chapter 6 Digital Authentication | 109 |
Chapter 10 Virtual Machines and Memory Protection | 197 |
Chapter 11 Access Control Using Descriptors and Capabilities | 227 |
Chapter 12 Access Control Using Lists and Rings | 245 |
Access Policies | 261 |
Chapter 13 Confidentiality and Integrity Policies | 263 |
Chapter 14 RoleBased Access Control | 289 |
Appendix A Summary of the AccessControl Logic | 313 |
321 | |
Chapter 7 Delegation | 133 |
Case Studies | 149 |
Isolation and Sharing | 175 |
Chapter 9 A Primer on Computer Hardware | 177 |
Notation Index | 324 |
Back cover | 325 |
Other editions - View all
Access Control, Security, and Trust: A Logical Approach Shiu-Kai Chin,Susan Beth Older Limited preview - 2011 |
Access Control, Security, and Trust: A Logical Approach Shiu-Kai Chin,Susan Beth Older Limited preview - 2010 |
Access Control, Security, and Trust: A Logical Approach Shiu-Kai Chin,Susan Beth Older No preview available - 2010 |
Common terms and phrases
able access-control logic Alice allows assigned associated assumptions authentication authority bank base bound called certificate chapter client condition confidentiality Consider contains contents controls corresponds define definition delegation derived describe determine encryption example execute Exercise express Figure formal formula function Give given granted hardware identify illustrates inference rules instruction integrity interpretation introduce Kripke structure Manager memory mode monitor objects operations particular pass permission physical principal processor proof protection prove public key reference relation represent request requirements result ring roles says secret segment sends server session shared shows signed simple situation sound specific statements stored Supervisor Suppose Table ticket trap true trust virtual machine worlds write