Acheter neuf

ou
Identifiez-vous pour activer la commande 1-Click.
Acheter d'occasion
D'occasion - Bon Voir les détails
Prix : EUR 39,58

ou
 
   
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 

Access Control, Security, and Trust: A Logical Approach [Anglais] [Relié]

Shiu-Kai Chin , Susan Beth Older

Prix : EUR 83,51 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 56,47  
Relié EUR 83,51  

Offres spéciales et liens associés


Descriptions du produit

Présentation de l'éditeur

Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.

The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control.

Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.

Biographie de l'auteur

Shiu-Kai Chin is a Meredith Professor in the Department of Electrical Engineering and Computer Science at Syracuse University. He is also director of the Center for Information and Systems Assurance and Trust. While at Syracuse, Dr. Chin has received the Outstanding Teacher Award, the Chancellor’s Citation for Outstanding Contributions to the University’s Academic Programs, and the Crouse Hinds Award for Excellence in Education.

Susan Older is an associate professor in the Department of Electrical Engineering and Computer Science at Syracuse University. She is also the program director for the Certificate of Advanced Study in Systems Assurance. Dr. Older’s research interests include programming-language semantics, logics of programs, formal methods, and information-assurance and computer science education.


Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 5.0 étoiles sur 5  1 commentaire
3 internautes sur 3 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent text for computer security 19 octobre 2011
Par William L. Harrison - Publié sur Amazon.com
Format:Relié
I teach a graduate course in information security. One of the headaches that I confront when teaching this course is the choice of reading material for the students. Matt Bishop's tome is encyclopedic, but it doesn't present enough depth in any particular subject for my grad class. Usually, I end up just assigning published research articles. This choice is OK, but less than ideal.

Then along came this text. It applies modal logic to access control security models, policies and mechanisms. Although it concerns mathematical logics for security, it seems to be require just a bit of mathematical maturity to understand---my (non-logician) students get it without much trouble. I just started using this text for my class and will continue to do so.
Ce commentaire a-t-il été utile ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?