Cantitate/Preț
Produs

Authorization and Access Control: Foundations, Frameworks, and Applications

Autor Parikshit N. Mahalle, Shashikant S. Bhong, Gitanjali R. Shinde
en Limba Engleză Paperback – 9 oct 2024
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.
FEATURES
  • Provides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms
  • Discusses a behavioral analysis of threats and attacks using UML base modeling
  • Covers the use of the OAuth 2.0 Protocol and UMA for connecting web applications
  • Includes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC)
  • Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 framework
This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 10618 lei  43-57 zile
  CRC Press – 9 oct 2024 10618 lei  43-57 zile
Hardback (1) 38649 lei  43-57 zile
  CRC Press – 2 mar 2022 38649 lei  43-57 zile

Preț: 10618 lei

Preț vechi: 16320 lei
-35% Nou

Puncte Express: 159

Preț estimativ în valută:
2033 2091$ 1686£

Carte tipărită la comandă

Livrare economică 17 februarie-03 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781032214542
ISBN-10: 1032214546
Pagini: 86
Ilustrații: 38
Dimensiuni: 138 x 216 mm
Greutate: 0.16 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Locul publicării:Boca Raton, United States

Public țintă

Academic

Notă biografică

Dr. Parikshit N. Mahalle obtained his B.E degree in Computer Science and Engineering from Sant Gadge Baba Amravati University, Amravati, India and M.E. degree in Computer Engineering from Savitribai Phule Pune University, Pune, India. He completed his Ph.D in Computer Science and Engineering specialization in Wireless Communication from Aalborg University, Aalborg, Denmark. He was Post Doc Researcher at CMI, Aalborg University, Copenhagen, Denmark. He worked as Professor and Head in the Department of Computer Engineering at STES‘s Smt. Kashibai Navale College of Engineering, Pune, India. Currently He is working as professor and head in Department of Artificial intelligence and Data Science, Vishwakarma Institute of Information Technology, Pune India. He has more than 20 years of teaching and research experience. He is a senior member IEEE, ACM member, Life member CSI and Life member ISTE. Also, he is a member of IEEE transaction on Information Forensics and Security, IEEE Internet of Things Journal. He is a reviewer for IGI Global – International Journal of Rough Sets and Data Analysis (IJRSDA), Associate Editor for IGI Global - International Journal of Synthetic Emotions (IJSE), Interscience International Journal of Grid and Utility Computing (IJGUC). He is a Member-Editorial Review Board for IGI Global – International Journal of Ambient Computing and Intelligence (IJACI). He is also working as an Associate Editor for IGI Global - International Journal of Synthetic Emotions (IJSE). He has published more than 150 research publications having 1711 citations and H index 18. He has 5 edited books to his credit by Springer and CRC Press. He has 7 patents to his credit. He has worked as Chairman of various Board of Studies.
Mr. Shashikant S. Bhong has 7+ years of experience, presently working as SPPU approved Assistant Professor in Department of computer Engineering, Smt. Kashibai Navale College of Engineering, Pune – 41 till date. he obtained M.E. (Computer Engineering) degree from Savitribai Phule Pune University, Pune and B.E. (Computer Engineering) degree from Savitribai Phule Pune University, Pune. he has published 4+ papers in National, International conferences and journals. He has worked as an assistant professor in STES, Rwanda Kigali, Rwanda (East Africa) in 2016, also he has worked as instructor/Trainer in Combat Training Centre(CTC) Gabiro, For Rwandan Army in Rwanda.
Dr. Gitanjali R. Shinde has overall 13 years of experience, presently working as Assistant Professor in Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune, India. She has done Ph.D in Wireless Communication from CMI, Aalborg University, Copenhagen, Denmark on Research Problem Statement "Cluster Framework for Internet of People, Things and Services". She obtained M.E. (Computer Engineering) degree from the University of Pune, Pune in 2012 and a B.E. (Computer Engineering) degree from the University of Pune, Pune in 2006. She has received research funding for the project "Lightweight Group Authentication for IoT" by SPPU, Pune. She has presented a research article at World Wireless Research Forum (WWRF) meeting, Beijing China. She has published 50+ papers in National, International conferences and journals. She is the author of 5+ books with a publisher like Springer and CRC Taylor & Francis Group. She is also editor of books with De Gruyter and Springer. She is a reviewer of prominent journal IGI publications and IEEE Transactions.

Cuprins

1. Introduction 2. Authorization and Access Control 3. Open Authorization 2.0 4. User-Managed Access 5. Conclusions

Descriere

This book focuses on various authorization and access control techniques, threats and attack modelling including overview of open Authorization 2.0 framework along with User managed access and security analysis. Detailed protocol overview and authorization process along with security analysis is discussed in this book including case studies.