Access Control Systems Security, Identity Management and Trust Models

Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access control mechanisms that are...

Full description

Bibliographic Details
Main Author: Benantar, Messaoud
Format: eBook
Language:English
Published: New York, NY Springer US 2006, 2006
Edition:1st ed. 2006
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02543nmm a2200409 u 4500
001 EB000354373
003 EBX01000000000000000207425
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9780387277165 
100 1 |a Benantar, Messaoud 
245 0 0 |a Access Control Systems  |h Elektronische Ressource  |b Security, Identity Management and Trust Models  |c by Messaoud Benantar 
250 |a 1st ed. 2006 
260 |a New York, NY  |b Springer US  |c 2006, 2006 
300 |a XXII, 262 p. 75 illus  |b online resource 
505 0 |a Foundations of Security and Access Control in Computing -- to Identity-Management Models -- Elements of Trust Paradigms in Computing -- Mandatory-Access-Control Model -- Discretionary-Access Control and the Access-Matrix Model -- The Take-Grant Protection Model -- The Schematic-Protection Model -- Role-Based Access Control 
653 |a Computer Communication Networks 
653 |a Operating Systems 
653 |a Operating systems (Computers) 
653 |a Cryptography 
653 |a Data Structures and Information Theory 
653 |a Application software 
653 |a Computer networks  
653 |a Information theory 
653 |a Data encryption (Computer science) 
653 |a Data structures (Computer science) 
653 |a Cryptology 
653 |a Computer and Information Systems Applications 
653 |a Special Purpose and Application-Based Systems 
653 |a Computers, Special purpose 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/0-387-27716-1 
856 4 0 |u https://doi.org/10.1007/0-387-27716-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.43 
520 |a Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access control mechanisms that are emerging with the latest Internet programming technologies, and explores all models employed and how they work. The latest role-based access control (RBAC) standard is also highlighted. This unique technical reference is designed for security software developers and other security professionals as a resource for setting scopes of implementations with respect to the formal models of access control systems. The book is also suitable for advanced-level students in security programming and system design