Not much to say on this book except that I found it incomplete and lacking in practical processes, more studious than application oriented. I have read better books on the subject like the IAM Success Tips: Volume 1 which offers a lot more strategical information since it is more of a guide than an
Access Control Systems: Security, Identity Management and Trust Models
โ Scribed by Dr. Messaoud Benantar (auth.)
- Publisher
- Springer US
- Year
- 2006
- Tongue
- English
- Leaves
- 280
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access control mechanisms that are emerging with the latest Internet programming technologies, and explores all models employed and how they work. The latest role-based access control (RBAC) standard is also highlighted.
This unique technical reference is designed for security software developers and other security professionals as a resource for setting scopes of implementations with respect to the formal models of access control systems. The book is also suitable for advanced-level students in security programming and system design.
โฆ Table of Contents
Foundations of Security and Access Control in Computing....Pages 1-39
Introduction to Identity-Management Models....Pages 40-72
Elements of Trust Paradigms in Computing....Pages 73-128
Mandatory-Access-Control Model....Pages 129-146
Discretionary-Access Control and the Access-Matrix Model....Pages 147-167
The Take-Grant Protection Model....Pages 168-179
The Schematic-Protection Model....Pages 180-189
Role-Based Access Control....Pages 190-251
โฆ Subjects
Operating Systems; Data Structures, Cryptology and Information Theory; Data Encryption; Special Purpose and Application-Based Systems; Information Systems Applications (incl.Internet); Computer Communication Networks
๐ SIMILAR VOLUMES
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series meets all standards put forth by CNSS 4011 & 4013A! Access control protects resources against unauthorized viewing, tampering, or destruction. These systems serve as a primary means of ensuring privacy, conf
"Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use
With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. This practical book is the first to explain the principles behind access management, the available technologies and how they work. It provides deta