Access Control, Security, and Trust: A Logical Approach

Shiu-Kai Chin, Susan Beth Older

Hardback
$83.96

eBook
from $47.00

July 26, 2010 by Chapman and Hall/CRC
Textbook - 351 Pages - 93 B/W Illustrations
ISBN 9781584888628 - CAT# C8628
Series: Chapman & Hall/CRC Cryptography and Network Security Series

FREE Standard Shipping!

was $104.95

$83.96

SAVE $20.99

Add to Cart
Add to Wish List

Features

  • Employs propositional modal logic to explain access control principles
  • Shows how to perform derivations and calculations with mathematical precision and accuracy
  • Focuses on reference monitors in security
  • Presents numerous examples ranging from the control of physical memory in hardware to multilevel security policies
  • Includes exercises that deal with application, analysis, synthesis, and evaluation
  • Offers HOL-4 implementation and slides for each chapter available for download on www.crcpress.com

Solutions manual available for qualifying instructors

Summary

Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.

The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control.

Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.

Instructors

We provide complimentary e-inspection copies of primary textbooks to instructors considering our books for course adoption.

Request an 
e-inspection copy

Share this Title