Index
Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.
A
abstraction, 340, 341–343, 347
abstraction, levels of, 67–68
access control, 200–210
attribute-based, 207–210
considerations, 105
covert channels, 205–206
identity-based, 206–207
mandatory, 203–205
access control decisions, 215
access control lists (ACLs), 202, 373
access control matrix, 200–201
access rights, 200–201
ACLs (access control lists), 202, 373
acquired-knowledge secrets, 40–42
actuation, 20–21
adaptability, 147
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.