Authorization and Access Control Authorization and Access Control

Authorization and Access Control

Foundations, Frameworks, and Applications

    • $37.99
    • $37.99

Publisher Description

This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.

FEATURES
Provides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms Discusses a behavioral analysis of threats and attacks using UML base modeling Covers the use of the OAuth 2.0 Protocol and UMA for connecting web applications Includes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC) Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 framework
This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.

GENRE
Computing & Internet
RELEASED
2022
27 February
LANGUAGE
EN
English
LENGTH
86
Pages
PUBLISHER
CRC Press
SELLER
Taylor & Francis Group
SIZE
3
MB
Emerging Technologies for Authorization and Authentication Emerging Technologies for Authorization and Authentication
2020
Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions
2007
Introduction to the New Mainframe: Security Introduction to the New Mainframe: Security
2007
Understanding SOA Security Design and Implementation Understanding SOA Security Design and Implementation
2007
Future of Trust in Computing Future of Trust in Computing
2009
Serverless Security Serverless Security
2020
ICT for Intelligent Systems ICT for Intelligent Systems
2025
ICT for Intelligent Systems ICT for Intelligent Systems
2025
ICT for Intelligent Systems ICT for Intelligent Systems
2025
ICT for Intelligent Systems ICT for Intelligent Systems
2024
ICT for Intelligent Systems ICT for Intelligent Systems
2024
Data-Centric Artificial Intelligence for Multidisciplinary Applications Data-Centric Artificial Intelligence for Multidisciplinary Applications
2024