Authorization and Access Control


LOOKING TO PLACE A BULK ORDER?CLICK HERE

Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Fast Delivery
Fast Delivery
Sustainably Printed
Sustainably Printed
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.

About The Book

<p>This book focuses on various authorization and access control techniques threats and attack modeling including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process along with security analysis of OAuth 2.0 are also discussed in the book. Case studies of websites with vulnerability issues are included.</p><p>FEATURES</p><ul> <p> </p> <li>Provides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms</li> <p> </p> <li>Discusses a behavioral analysis of threats and attacks using UML base modeling</li> <p> </p> <li>Covers the use of the OAuth 2.0 Protocol and UMA for connecting web applications</li> <p> </p> <li>Includes role-based access control (RBAC) discretionary access control (DAC) mandatory access control (MAC) and permission-based access control (PBAC)</li> <p> </p> <li>Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 framework</li> </ul><p>This book is for researchers and professionals who are engaged in IT security auditing and computer engineering.</p>
downArrow

Details