Index

Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.

A

abstraction, 340, 341–343, 347

abstraction, levels of, 67–68

access control, 200–210

attribute-based, 207–210

considerations, 105

covert channels, 205–206

discretionary, 201–205, 370

identity-based, 206–207

mandatory, 203–205

policy-based, 356, 358–360

access control decisions, 215

access control lists (ACLs), 202, 373

access control matrix, 200–201

access rights, 200–201

ACLs (access control lists), 202, 373

acquired-knowledge secrets, 40–42

active data, 56, 57

actuation, 20–21

actuators, 20, 417

adaptability, 147

Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.