Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Authorization and access control : foundations, frameworks, and applications
by
Mahalle, Parikshit N., author
, Bhong, Shashikant S., author
, Shinde, Gitanjali Rahul, 1983- author
in
Computer networks Security measures.
/ Web sites Access control.
/ Internet of things Security measures.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Authorization and access control : foundations, frameworks, and applications
by
Mahalle, Parikshit N., author
, Bhong, Shashikant S., author
, Shinde, Gitanjali Rahul, 1983- author
in
Computer networks Security measures.
/ Web sites Access control.
/ Internet of things Security measures.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Authorization and access control : foundations, frameworks, and applications
Book
Authorization and access control : foundations, frameworks, and applications
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
\"This book focuses on various authorization and access control techniques, threats and attack modelling including overview of open Authorization 2.0 (Oauth2.0) framework along with User managed access (UMA) and security analysis. Important key concepts are discussed on how to provide login credentials with restricted access to third parties with primary account as a resource server. Detailed protocol overview and authorization process along with security analysis of Oauth 2.0 is discussed in this book. This book also includes case studies of websites for vulnerability issues. Features : provides overview of security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms, discusses behavioral analysis of threats and attacks using UML base modelling, covers use of Oauth2.0 Protocol and UMA for connecting web applications, includes Role Based Access Control (RBAC), Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Permission Based Access Control (PBAC). and explores how to provide access to third party web applications through resource server by use of secured and reliable Oauth2.0 framework. This book aims at researchers and professionals in IT Security, Auditing, and Computer Engineering\"-- Provided by publisher.
Publisher
CRC Press
Subject
ISBN
9781032214528, 9781032214542
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| TK5105.59 .M36169 2022 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.