TY - BOOK
T1 - Access control, security, and trust
T2 - A logical approach
AU - Chin, Shiu Kai
AU - Older, Susan
N1 - Publisher Copyright:
© 2011 by Taylor & Francis Group, LLC.
PY - 2010/1/1
Y1 - 2010/1/1
N2 - Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control. Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.
AB - Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control. Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.
UR - http://www.scopus.com/inward/record.url?scp=85054466606&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85054466606&partnerID=8YFLogxK
U2 - 10.1201/9781439894637
DO - 10.1201/9781439894637
M3 - Book
AN - SCOPUS:85054466606
SN - 9781584888628
BT - Access control, security, and trust
PB - CRC Press
ER -