Preface |
|
ix | |
|
|
1 | (16) |
|
|
2 | (2) |
|
|
4 | (1) |
|
|
4 | (5) |
|
|
9 | (8) |
|
Foundations of Computer Security |
|
|
17 | (18) |
|
|
18 | (7) |
|
The Fundamental Dilemma of Computer Security |
|
|
25 | (1) |
|
|
26 | (1) |
|
Principles of Computer Security |
|
|
27 | (4) |
|
|
31 | (4) |
|
Identification and Authentication |
|
|
35 | (16) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (2) |
|
|
40 | (1) |
|
Protecting the Password File |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
44 | (7) |
|
|
51 | (20) |
|
|
52 | (1) |
|
Authentication and Authorization |
|
|
52 | (2) |
|
|
54 | (3) |
|
|
57 | (1) |
|
Access Control Structures |
|
|
57 | (3) |
|
|
60 | (4) |
|
|
64 | (7) |
|
|
71 | (20) |
|
|
72 | (2) |
|
Operating System Integrity |
|
|
74 | (1) |
|
Hardware Security Features |
|
|
75 | (8) |
|
|
83 | (8) |
|
|
91 | (24) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (2) |
|
|
97 | (4) |
|
|
101 | (3) |
|
Instances of General Security Principles |
|
|
104 | (6) |
|
|
110 | (5) |
|
|
115 | (24) |
|
|
116 | (3) |
|
Access Control -- Components |
|
|
119 | (8) |
|
|
127 | (5) |
|
|
132 | (2) |
|
|
134 | (5) |
|
|
139 | (14) |
|
|
140 | (1) |
|
|
140 | (6) |
|
The Multics Interpretation of BLP |
|
|
146 | (7) |
|
|
153 | (16) |
|
|
154 | (1) |
|
|
155 | (2) |
|
|
157 | (2) |
|
The Harrison--Ruzzo--Ullman Model |
|
|
159 | (3) |
|
|
162 | (2) |
|
|
164 | (5) |
|
|
169 | (16) |
|
|
170 | (3) |
|
|
173 | (4) |
|
|
177 | (1) |
|
Information Technology Security Evaluation Criteria |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
182 | (3) |
|
|
185 | (26) |
|
|
186 | (3) |
|
|
189 | (2) |
|
Integrity Check Functions |
|
|
191 | (3) |
|
|
194 | (4) |
|
|
198 | (7) |
|
|
205 | (2) |
|
|
207 | (4) |
|
Authentication in Distributed Systems |
|
|
211 | (22) |
|
|
212 | (1) |
|
Key Establishment and Authentication |
|
|
212 | (3) |
|
Key Establishment Protocols |
|
|
215 | (4) |
|
|
219 | (5) |
|
Public Key Infrastructures |
|
|
224 | (5) |
|
Trusted Computing--Attestation |
|
|
229 | (4) |
|
|
233 | (24) |
|
|
234 | (3) |
|
Protocol Design Principles |
|
|
237 | (2) |
|
|
239 | (4) |
|
|
243 | (4) |
|
|
247 | (1) |
|
|
247 | (4) |
|
|
251 | (6) |
|
|
257 | (26) |
|
|
258 | (1) |
|
|
259 | (4) |
|
Canonical Representations |
|
|
263 | (1) |
|
|
264 | (7) |
|
|
271 | (3) |
|
|
274 | (1) |
|
|
275 | (8) |
|
New Access Control Paradigms |
|
|
283 | (24) |
|
|
284 | (2) |
|
Code-based Access Control |
|
|
286 | (4) |
|
|
290 | (5) |
|
|
295 | (4) |
|
|
299 | (2) |
|
|
301 | (1) |
|
|
302 | (2) |
|
Digital Rights Management |
|
|
304 | (3) |
|
|
307 | (20) |
|
|
308 | (1) |
|
|
308 | (5) |
|
|
313 | (2) |
|
|
315 | (5) |
|
|
320 | (4) |
|
|
324 | (3) |
|
|
327 | (22) |
|
|
328 | (2) |
|
|
330 | (4) |
|
|
334 | (5) |
|
Statistical Database Security |
|
|
339 | (5) |
|
Integration with the Operating System |
|
|
344 | (2) |
|
|
346 | (3) |
Bibliography |
|
349 | (12) |
Index |
|
361 | |