Picture 1 of 1
Gallery
Picture 1 of 1

Have one to sell?
Access Control, Security, and Trust (Chapman & Hall/CRC Cryptography and Net...
US $74.14
ApproximatelyS$ 96.57
or Best Offer
Condition:
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free USPS Media MailTM.
Located in: San Diego, California, United States
Delivery:
Estimated between Fri, 14 Nov and Tue, 18 Nov to 94104
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:326859701437
Item specifics
- Condition
- Release Year
- 2011
- Book Title
- Access Control, Security, and Trust (Chapman & Hall/CRC Crypto...
- ISBN
- 9781584888628
About this product
Product Identifiers
Publisher
CRC Press LLC
ISBN-10
1584888628
ISBN-13
9781584888628
eBay Product ID (ePID)
102831814
Product Key Features
Number of Pages
352 Pages
Publication Name
Access Control, Security, and Trust : a Logical Approach
Language
English
Publication Year
2010
Subject
Security / General, Security / Networking
Type
Textbook
Subject Area
Computers
Series
Chapman and Hall/Crc Cryptography and Network Security Ser.
Format
Hardcover
Dimensions
Item Height
0.9 in
Item Weight
22.4 Oz
Item Length
9.6 in
Item Width
6.2 in
Additional Product Features
Intended Audience
College Audience
LCCN
2010-022619
Reviews
Focusing on the logic of access control, more than on actual computer programming, this volume is designed as a textbook for undergraduates. Each chapter ends with exercises and a concise description of expected learning outcomes. The authors, both in electrical engineering and computer science at Syracuse University, also teach an intensive summer course on access control for hundreds of ROTC cadets. It contains a useful selection of tables and figures, a notation index and a brief bibliography. "SciTech Book News, February 2011, Focusing on the logic of access control, more than on actual computer programming, this volume is designed as a textbook for undergraduates. Each chapter ends with exercises and a concise description of expected learning outcomes. The authors, both in electrical engineering and computer science at Syracuse University, also teach an intensive summer course on access control for hundreds of ROTC cadets. It contains a useful selection of tables and figures, a notation index and a brief bibliography. --SciTech Book News, February 2011, Focusing on the logic of access control, more than on actual computer programming, this volume is designed as a textbook for undergraduates. Each chapter ends with exercises and a concise description of expected learning outcomes. The authors, both in electrical engineering and computer science at Syracuse University, also teach an intensive summer course on access control for hundreds of ROTC cadets. It contains a useful selection of tables and figures, a notation index and a brief bibliography. -SciTech Book News, February 2011, Focusing on the logic of access control, more than on actual computer programming, this volume is designed as a textbook for undergraduates. Each chapter ends with exercises and a concise description of expected learning outcomes. The authors, both in electrical engineering and computer science at Syracuse University, also teach an intensive summer course on access control for hundreds of ROTC cadets. It contains a useful selection of tables and figures, a notation index and a brief bibliography. e"SciTech Book News, February 2011
Illustrated
Yes
Table Of Content
Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access Control Sets and Relations Syntax Semantics Reasoning about Access Control Logical Rules Formal Proofs and Theorems Soundness of Logical Rules Basic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security Policies Confidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial Policies DISTRIBUTED ACCESS CONTROL Digital Authentication Public-Key Cryptography Efficiency Mechanisms Reasoning about Cryptographic Communications Certificates, Certificate Authorities, and Trust Symmetric-Key Cryptography Delegation Simple Delegations Delegation and Its Properties A Delegation Example: Simple Checking Networks: Case Studies SSL and TLS: Authentication across the Web Kerberos: Authentication for Distributed Systems Financial Networks ISOLATION AND SHARING A Primer on Computer Hardware Ones and Zeros Synchronous Design Microcode Virtual Machines and Memory Protection A Simple Processor Processors with Memory Segmentation Controlling Access to Memory and Segmentation Registers Design of the Virtual Machine Monitor Access Control Using Descriptors and Capabilities Address Descriptors and Capabilities Tagged Architectures Capability Systems Access Control Using Lists and Rings Generalized Addresses Segment Access Controllers ACL-Based Access Policy for Memory Accesses Ring-Based Access Control ACCESS POLICIES Confidentiality and Integrity Policies Classifications and Categories Bell-La Padula Model, Revisited Confidentiality Levels: Some Practical Considerations Biba's Strict Integrity, Revisited Lipner's Integrity Model Role-Based Access Control RBAC Fundamentals Separation of Duty Representing RBAC Systems in the Logic Appendix: Summary of the Access Control Logic Index A Summary and Further Reading appear at the end of each chapter.
Synopsis
Using propositional modal logic to explain access control principles, this workprovides the mathematical means to comprehend, analyze, create and verify the policies and control mechanisms used to protect resources. It starts with a preliminary introduction and then covers distributed access control, resources and sharing, and security monitors, the latter of which serves as a bridge to classical security models. While structured as a text for advanced undergraduates and graduate students, the book also meets the reference needs of those computer engineers, computer scientists, and information technologists responsible for designing, implementing, and verifying computer and information systems., Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control. Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.
LC Classification Number
QA76.9.A25
Item description from the seller
Seller feedback (7,900)
- l***p (21)- Feedback left by buyer.Past monthVerified purchaseI received quality items in excellent condition as pictured. The packaging was great and kept my shipment well protected. I received my purchase fast and had no communication problems with the seller who was very helpful. 100% would purchase from this seller again.
- e***n (2265)- Feedback left by buyer.Past 6 monthsVerified purchaseExcellent seller📡, great communication📞, fast delivery 🚚 , extra care in packing for shipment 📦, great price 💰, Came as shown in photo📸, I would do repeat buys in 1 sec with this seller. AAAA ++++. 5 st🌟rs. <(•🪖•)>Great Battles for Boys the Korean War (#326650524269)
- i***e (5240)- Feedback left by buyer.Past 6 monthsVerified purchaseThe book arrived promptly and in good shape, as described, and packaged in a sturdy little cardboard box, not a flimsy mailing bag. (When I receive a book packaged only in a plastic bag, that's an instant negative, as far as I'm concerned.) So, to sum up: I'm pleased.Basin and Range - John McPhee (#326579640173)