This book focuses on various authorization and access control
techniques, threats and attack modeling, including an overview of the
Open Authorization 2.0 (OAuth 2.0) framework along with user-managed
access (UMA) and security analysis. Important key concepts are discussed
regarding login credentials with restricted access to third parties with
a primary account as a resource server. A detailed protocol overview and
authorization process, along with security analysis of OAuth 2.0, are
also discussed in the book. Case studies of websites with vulnerability
issues are included.
FEATURES
- Provides an overview of the security challenges of IoT and mitigation
techniques with a focus on authorization and access control mechanisms
- Discusses a behavioral analysis of threats and attacks using UML base
modeling
- Covers the use of the OAuth 2.0 Protocol and UMA for connecting web
applications
- Includes role-based access control (RBAC), discretionary access
control (DAC), mandatory access control (MAC) and permission-based
access control (PBAC)
- Explores how to provide access to third-party web applications through
a resource server by use of a secured and reliable OAuth 2.0 framework
This book is for researchers and professionals who are engaged in IT
security, auditing and computer engineering.