000 02931nam a22005055i 4500
001 978-0-387-27716-5
003 DE-He213
005 20250710083940.0
007 cr nn 008mamaa
008 100301s2006 xxu| s |||| 0|eng d
020 _a9780387277165
_a99780387277165
024 7 _a10.1007/0-387-27716-1
_2doi
082 0 4 _a005.43
_223
100 1 _aBenantar, Messaoud.
_eauthor.
245 1 0 _aAccess Control Systems
_h[recurso electrónico] :
_bSecurity, Identity Management and Trust Models /
_cby Messaoud Benantar.
264 1 _aBoston, MA :
_bSpringer US,
_c2006.
300 _aXXI, 261 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aFoundations of Security and Access Control in Computing -- to Identity-Management Models -- Elements of Trust Paradigms in Computing -- Mandatory-Access-Control Model -- Discretionary-Access Control and the Access-Matrix Model -- The Take-Grant Protection Model -- The Schematic-Protection Model -- Role-Based Access Control.
520 _aAccess Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access control mechanisms that are emerging with the latest Internet programming technologies, and explores all models employed and how they work. The latest role-based access control (RBAC) standard is also highlighted. This unique technical reference is designed for security software developers and other security professionals as a resource for setting scopes of implementations with respect to the formal models of access control systems. The book is also suitable for advanced-level students in security programming and system design.
650 0 _aCOMPUTER SCIENCE.
650 0 _aCOMPUTER COMMUNICATION NETWORKS.
650 0 _aSOFTWARE ENGINEERING.
650 0 _aOPERATING SYSTEMS (COMPUTERS).
650 0 _aDATA STRUCTURES (COMPUTER SCIENCE).
650 0 _aDATA ENCRYPTION (COMPUTER SCIENCE).
650 0 _aINFORMATION SYSTEMS.
650 1 4 _aCOMPUTER SCIENCE.
650 2 4 _aOPERATING SYSTEMS.
650 2 4 _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY.
650 2 4 _aDATA ENCRYPTION.
650 2 4 _aSPECIAL PURPOSE AND APPLICATION-BASED SYSTEMS.
650 2 4 _aINFORMATION SYSTEMS APPLICATIONS (INCL.INTERNET).
650 2 4 _aCOMPUTER COMMUNICATION NETWORKS.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387004457
856 4 0 _uhttp://dx.doi.org/10.1007/0-387-27716-1
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SCS
942 _2ddc
_cER
999 _c56734
_d56734