Access Control, Security, and Trust - Chin, Shiu-Kai
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre145,99 €
Produit Neuf
Ou 36,50 € /mois
- Livraison : 25,00 €
- Livré entre le 15 et le 20 mai
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Access Control, Security, And Trust de Chin, Shiu - Kai Format Broché - Livre
0 avis sur Access Control, Security, And Trust de Chin, Shiu - Kai Format Broché - Livre
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Access Control, Security, And Trust de Chin, Shiu - Kai Format Broché
- Livre
Résumé : Preliminaries. Distributed Access Control. Isolation and Sharing. Access Policies. Appendix. Index.
Biographie: Shiu-Kai Chin is a Meredith Professor in the Department of Electrical Engineering and Computer Science at Syracuse University. He is also director of the Center for Information and Systems Assurance and Trust. While at Syracuse, Dr. Chin has received the Outstanding Teacher Award, the Chancellor's Citation for Outstanding Contributions to the University's Academic Programs, and the Crouse Hinds Award for Excellence in Education. Susan Older is an associate professor in the Department of Electrical Engineering and Computer Science at Syracuse University. She is also the program director for the Certificate of Advanced Study in Systems Assurance. Dr. Older's research interests include programming-language semantics, logics of programs, formal methods, and information-assurance and computer science education.
Sommaire: Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control. Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.
Détails de conformité du produit
Personne responsable dans l'UE