Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Authorization and Access Control
Paperback

Authorization and Access Control

$41.99
Sign in or become a Readings Member to add this title to your wishlist.

This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.

FEATURES

Provides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms

Discusses a behavioral analysis of threats and attacks using UML base modeling

Covers the use of the OAuth 2.0 Protocol and UMA for connecting web applications

Includes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC)

Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 framework

This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Paperback
Publisher
Taylor & Francis Ltd
Country
United Kingdom
Date
9 October 2024
Pages
74
ISBN
9781032214542

This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.

FEATURES

Provides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms

Discusses a behavioral analysis of threats and attacks using UML base modeling

Covers the use of the OAuth 2.0 Protocol and UMA for connecting web applications

Includes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC)

Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 framework

This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.

Read More
Format
Paperback
Publisher
Taylor & Francis Ltd
Country
United Kingdom
Date
9 October 2024
Pages
74
ISBN
9781032214542