Access Control Security, and Trust; A Logical Approach by Shiu-Kai Chin; Susan Older instant download
Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access-control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access-control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access-control logic, basic access-control concepts, and an introduction to confidentiality and integrity policies. The second section covers access-control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access-control. Features • Employs propositional modal logic to explain access-control principles • Shows how to perform derivations and calculations with mathematical precision and accuracy • Focuses on reference monitors in security • Presents numerous examples ranging from the control of physical memory in hardware to multilevel security policies • Includes exercises that deal with application, analysis, synthesis, and evaluation • Offers HOL-4 implementation and slides for each chapter available for download on www.crcpress.com Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access-control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.