16,95 €
16,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
8 °P sammeln
16,95 €
16,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
8 °P sammeln
Als Download kaufen
16,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
8 °P sammeln
Jetzt verschenken
16,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
8 °P sammeln
  • Format: ePub

This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.
…mehr

  • Geräte: eReader
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 2.1MB
Produktbeschreibung
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.



FEATURES





  • Provides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms


  • Discusses a behavioral analysis of threats and attacks using UML base modeling


  • Covers the use of the OAuth 2.0 Protocol and UMA for connecting web applications


  • Includes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC)


  • Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 framework




This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Dr. Parikshit N. Mahalle obtained his B.E degree in Computer Science and Engineering from Sant Gadge Baba Amravati University, Amravati, India and M.E. degree in Computer Engineering from Savitribai Phule Pune University, Pune, India. He completed his Ph.D in Computer Science and Engineering specialization in Wireless Communication from Aalborg University, Aalborg, Denmark. He was Post Doc Researcher at CMI, Aalborg University, Copenhagen, Denmark. He worked as Professor and Head in the Department of Computer Engineering at STES's Smt. Kashibai Navale College of Engineering, Pune, India. Currently He is working as professor and head in Department of Artificial intelligence and Data Science, Vishwakarma Institute of Information Technology, Pune India. He has more than 20 years of teaching and research experience. He is a senior member IEEE, ACM member, Life member CSI and Life member ISTE. Also, he is a member of IEEE transaction on Information Forensics and Security, IEEE Internet of Things Journal. He is a reviewer for IGI Global - International Journal of Rough Sets and Data Analysis (IJRSDA), Associate Editor for IGI Global - International Journal of Synthetic Emotions (IJSE), Interscience International Journal of Grid and Utility Computing (IJGUC). He is a Member-Editorial Review Board for IGI Global - International Journal of Ambient Computing and Intelligence (IJACI). He is also working as an Associate Editor for IGI Global - International Journal of Synthetic Emotions (IJSE). He has published more than 150 research publications having 1711 citations and H index 18. He has 5 edited books to his credit by Springer and CRC Press. He has 7 patents to his credit. He has worked as Chairman of various Board of Studies.



Mr. Shashikant S. Bhong
has 7+ years of experience, presently working as SPPU approved Assistant Professor in Department of computer Engineering, Smt. Kashibai Navale College of Engineering, Pune - 41 till date. he obtained M.E. (Computer Engineering) degree from Savitribai Phule Pune University, Pune and B.E. (Computer Engineering) degree from Savitribai Phule Pune University, Pune. he has published 4+ papers in National, International conferences and journals. He has worked as an assistant professor in STES, Rwanda Kigali, Rwanda (East Africa) in 2016, also he has worked as instructor/Trainer in Combat Training Centre(CTC) Gabiro, For Rwandan Army in Rwanda.



Dr. Gitanjali R. Shinde
has overall 13 years of experience, presently working as Assistant Professor in Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune, India. She has done Ph.D in Wireless Communication from CMI, Aalborg University, Copenhagen, Denmark on Research Problem Statement "Cluster Framework for Internet of People, Things and Services". She obtained M.E. (Computer Engineering) degree from the University of Pune, Pune in 2012 and a B.E. (Computer Engineering) degree from the University of Pune, Pune in 2006. She has received research funding for the project "Lightweight Group Authentication for IoT" by SPPU, Pune. She has presented a research article at World Wireless Research Forum (WWRF) meeting, Beijing China. She has published 50+ papers in National, International conferences and journals. She is the author of 5+ books with a publisher like Springer and CRC Taylor & Francis Group. She is also editor of books with De Gruyter and Springer. She is a reviewer of prominent journal IGI publications and IEEE Transactions.