O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 23

Policies, Access Control, and Formal Methods

Elisa Bertino

23.1 Introduction

The pervasive nature of today's computing infrastructure makes it possible for organizations and individuals to collect, distribute, and share huge amounts of information. The wealth of available information can be used by many different tools, such as data mining, in the context of a large range of application domains, from health care and learning to homeland security, electronic surveillance, defense, and fraud detection. However, such rapid advancement in the use of information in industry, government, and academia raises challenging questions and problems regarding the protection and use of this information. The proper use of information is particularly ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required