Chapter 23

Policies, Access Control, and Formal Methods

Elisa Bertino

23.1 Introduction

The pervasive nature of today's computing infrastructure makes it possible for organizations and individuals to collect, distribute, and share huge amounts of information. The wealth of available information can be used by many different tools, such as data mining, in the context of a large range of application domains, from health care and learning to homeland security, electronic surveillance, defense, and fraud detection. However, such rapid advancement in the use of information in industry, government, and academia raises challenging questions and problems regarding the protection and use of this information. The proper use of information is particularly ...

Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.